|  | 
                                                
                                                    | 
                                                            
                                                                |  |  | Home - Virus Alerts |  |  
                      |  |  
                                                              | 
                                                              
                                                                
                                                                  
			                                                        It has been reported that a new ransomware, dubbed, "ProLock" is spreading. This is a successor of PwndLocker ransomware strain that 
emerged in the late 2019. The ransomware affects organizations of various sectors including government, financial, retail and heath care 
organizations.
 VIRUS ALERTS
 ProLock RansomwareOriginal Issue Date:August    03, 2020 Virus Type: Ransomware 
 Initial access and infection mechanism:
 
 ProLock obtains the access of victim¿s network in several ways but the main vectors of initial access are: improperly configured 
RDP servers with weak credentials and QakBot (Qbot) Trojan. While the earlier vector is common among various malware attacks, the QakBot 
Trojan is one to note which is affiliated with MegaCortex ransomware and loaded via Emotet malware in erstwhile campaigns. The use of 
QakBot by the ProLock operators may be seen as a collaboration among threat actors to utilize the skill-set of multiple teams.
 
 QakBot is typically distributed via phishing emails which may contain attachments of weaponized Microsoft Office documents or just 
links to such documents that are located on cloud storage ¿ Microsoft OneDrive, for example. When the weaponized document is downloaded 
and opened, malicious macros enabled. Then, PowerShell is launched; and download and run the QakBot payload from the command-and-control 
(C2) server. ProLock payload is extracted from a BMP or JPG file, and is loaded into memory with PowerShell. Sometimes a scheduled task is 
used to run PowerShell.
 
 QakBot trojan armed the ransomware with increased capability such as keylogging and also able to download and run additional scripts like 
"Invoke-Mimikatz" (a PowerShell version of Mimikatz) for credential dumping. Through this tactic, the malware operators can siphon off 
privileged credentials and then use these for network discovery activities such as port scanning and Active Directory reconnaissance. 
Attackers also use "AdFind" to query Active Directory.
 
 ProLock then uses RDP to move laterally across network and collect data for exfiltration by using a command-line tool "Rclone" 
that is capable of synching files to and from different cloud storage providers (such as OneDrive, Google Drive, Mega, etc.). The 
ransomware tries to shut down more than 150 services linked to enterprise applications, security software, and backups by using net.exe. 
(For the full list of targeted services and processes, please visit the URLs given in "IOC" below.) ProLock deletes the shadow copies of 
local files using vssadmin.exe to prevent recovery.
 While making the guarding factors out of the way, the ransomware starts encrypting the files which are more than 8192 bytes and append 
extension .proLock, .pr0Lock or .proL0ck extension to each encrypted file and drops a text file named [HOW TO RECOVER FILES].TXT to each 
folder containing ransom note and other instructions.
 
 For complete list, please refer
 https://github.com/sophoslabs/IoCs/blob/master/Ransomware-ProLock.csv
 
 BTC Wallet Address:
 Email Contact:1LVLHAs4Vq9Yt9nHvvrgw9djtA7BiR8sKM (for incident response only, do not pay ransom)
 Detection:support981723721[AT]protonmail.com
 For full list, please refer:
Refer list of the processes and services targeted by the ransomware at:
Countermeasures and Best practices for prevention:Win32:Evo-gen [Susp]
Trojan.Peed.Gen
Trojan:Win32/Wacatac.D!ml 
 Users are advised to disable their RDP if not in use, if required, it should be placed behind the firewall and users are to bind 
with proper policies while using the RDP.
Install ad blockers to combat exploit kits such as Fallout that are distributed via malicious advertising.
All operating systems and applications should be kept updated on a regular basis. Virtual patching can be considered for protecting 
legacy systems and networks. This measure hinders cybercriminals from gaining easy access to any system through vulnerabilities in 
outdated applications and software. Avoid applying updates / patches available in any unofficial channel.
Restrict execution of Power shell /WSCRIPT in an enterprise environment. Ensure installation and use of the latest version of 
PowerShell, with enhanced logging enabled. Script block logging and transcription enabled. Send the associated logs to a centralized log 
repository for monitoring and analysis.https://www.fireeye.com/blog/threat-research/2016/02/greater_visibilityt.html
Establish a Sender Policy Framework (SPF) for your domain, which is an email validation system designed to prevent spam by detecting 
email spoofing by which most of the ransomware samples successfully reaches the corporate email boxes.
Application whitelisting/Strict implementation of Software Restriction Policies (SRP) to block binaries running from %APPDATA% and 
%TEMP% paths. Ransomware sample drops and executes generally from these locations.
Don't open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained 
in an unsolicited e-mail, even if the link seems benign. In cases of genuine URLs close out the e-mail and go to the organization¿s 
website directly through browser.
Block the attachments of file types, exe|pif|tmp|url|vb|vbe|scr|reg|cer|pst|cmd|com|bat|dll|dat|hlp|hta|js|wsf
Consider encrypting the confidential data as the ransomware generally targets common file types.
Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery 
process. Ideally, this data should be kept on a separate device, and backups should be stored offline.
Network segmentation and segregation into security zones - help protect sensitive information and critical services. Separate 
administrative network from business processes with physical controls and Virtual Local Area Networks.
 Referenceshttps://www.group-ib.com/blog/prolock https://news.sophos.com/en-us/2020/07/27/prolock-ransomware-gives-you-the-first-8-kilobytes-of-decryption-for-free/
 https://threatpost.com/prolock-ransomware-qakbot-trojan/155828/
 https://www.pcrisk.com/removal-guides/17366-prolock-ransomware
 https://www.zdnet.com/article/fbi-prolock-ransomware-gains-access-to-victim-networks-via-qakbot-infections/
 
 
						| Disclaimer |  
                                                                |  |  
						| The information provided herein is on "as is" basis, without warranty of any kind.  |  
                                                                |  |  
						| Contact Information |  
                                                                |  |  
						| Email:info@cert-in.org.inPhone: +91-11-22902657
 |  
                                                                |  |  
						| Postal Address |  
                                                                |  |  
						| Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology
 Government of India
 Electronics Niketan
 6, CGO Complex, Lodhi Road,
 New Delhi - 110 003
 India
 |    |  
                                                                |  |  
                                                                |  |  
                                                                |  |  |  
                                                    |  |  
                                                    
                                                 |