UNIZA Ransomware

11056057461?profile=RESIZE_400xUNIZA Ransomware - Researchers recently came across a new ransomware variant called UNIZA.  Like other ransomware variants, it encrypts files on victims’ machines to extort money.  

It uses the Command Prompt (cmd.exe) window to display its ransom message, and interestingly, it does not append the filename of the files it encrypts, making it more difficult to determine which files have been impacted.[1]

Infection Vector - Information on the infection vector used by the UNIZA ransomware threat actor is not currently available however, the likely attack vector is via email as many ransomware variants are distributed that way.

At the time of this research, there is no indication that UNIZA ransomware is widespread.

Ransomware Execution -

Affected platforms: Microsoft Windows

Impacted parties: Microsoft Windows Users

Impact: Encrypts files on the compromised machine and demands ransom for file decryption

Severity level: High

UNIZA ransomware is a typical ransomware that encrypts files on compromised machines and demands a ransom payment for recovering the affected files.

The ransomware targets all directories and files found under %userprofile% and Desktop for file encryption.

11056100469?profile=RESIZE_584xFigure 1. UNIZA ransomware encryption code

Figure 1. displays the ransomware encryption code.  Elements of this image are as follows:

  • The green box represents the encryption key
  • The yellow box represents a file limit
  • Any file smaller than the value gets encrypted
  • Any file equal or greater to the value gets skipped
  • The red box represents the encryption method used
  • Each byte in the file gets added to a single byte in the rolling key (defined in the green box)

Although the ransomware does not append any file extension to the encrypted files, they are indeed encrypted, as shown below:

11056102681?profile=RESIZE_584xFigure 2. Text file before being encrypted by the UNIZA ransomware

11056112664?profile=RESIZE_584xFigure 3. Text file in Figure 1 after being encrypted by the UNIZA ransomware

Instead of dropping a ransom note, it launches the Command Prompt and the ransom note gradually shows up as if the attacker is remotely typing the message. This may be a scare tactic to make victims believe that the attacker can remotely control their machine.

The ransom message asks victims to contact the attacker via TikTok and demands 20 Euros worth of Bitcoin.  As the ransom fee is relatively low, we believe the UNIZA ransomware threat actor is targeting consumers.

At the time of Fortinet’s research, the attacker’s Bitcoin wallet has not recorded a single transaction, which means that no victims have yet fallen prey to this ransomware.

IOCs

File-based IOCs:

SHA256

Malware

eefa1271d1a2a937d0baa3f0c7d904941151d6c8f915aed4dd51f10fa5d09b2a

UNIZA ransomware

d9a3f2ad7cfc6989cc4da117d5a4f8097362aad6b91391e89746d68d8d7aa29f

UNIZA ransomware

9092ef0beeef1b147c13da3f3259f4a075f3bfb2414c39f9108395435ac9887c

UNIZA ransomware

 

Best Practices include Not Paying a Ransom - Organizations such as CISA, NCSC, the FBI, and HHS caution ransomware victims against paying a ransom partly because the payment does not guarantee that files will be recovered. According to a U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) advisory, ransom payments may also embolden adversaries to target additional organizations, encourage other criminal actors to distribute ransomware, and/or fund illicit activities that could potentially be illegal. For organizations and individuals affected by ransomware, the FBI has a Ransomware Complaint page where victims can submit samples of ransomware activity via their Internet Crimes Complaint Center (IC3).

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225, or feedback@redskyalliance.com

Weekly Cyber Intelligence Briefings:

Weekly Cyber Intelligence Briefings:

REDSHORTS - Weekly Cyber Intelligence Briefings

https://attendee.got

[1] https://www.fortinet.com/blog/threat-research/ransomware-roundup-uniza-coverage/

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!