Cybereason Blog | Cybersecurity News and Analysis

THREAT ALERT: Inside the Redeemer 2.0 Ransomware

Written by Cybereason Global SOC Team | Aug 19, 2022 2:57:16 PM

The Cybereason Global Security Operations Center (SOC) Team issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them. In this article, the Cybereason Research team exposes Redeemer 2.0, an updated version of the original ransomware.

What's Happening?

The malware dubbed Redeemer 2.0 is an updated variant of the Redeemer ransomware. This version differs from its older variants as it:

  • Infects machines running the Windows 11 Operating Systems (OS). 
  • Keeps the OS safe from unintended damage (outside of the file encryption).
  • Changes the icons of encrypted files

In this article, Cybereason Security Research Team analyzed the new release of this ransomware and how to defend against it through the Cybereason Defense Platform.

Key Observations

  • In July 2022, a new version of Redeemer (v2.0) was released on an underground forum
  • The new variant is advertised as “easy-to-use” and supports Windows 11
  • The Cybereason Defense Platform includes Anti-Ransomware and Anti-Malware capabilities that detects and prevents the ransomware payload execution.

Analysis

Redeemer 2.0 Toolkit Release

A new and improved Redeemer 2.0 ransomware version was released on an underground forum. The author, calling himself “Cerebrate”, describes the new version as a “C++ no dependency ransomware with no privacy intrusions”, targeting the Windows OS:

Underground forum screenshot

Redeemer Toolkit and Build

The Redeemer 2.0 ransomware build can be generated using the toolkit as shown in this video:

 

Redeemer 2.0 Ransomware Builder

The build of the ransomware copies itself into the Windows directory with legitimate file names and executes itself as a new process, for example sqlserver1.exe, svchost.exe, etc.

The Cybereason Defense Platform Anti-Malware capability detects and prevents the ransomware execution:

MalOp Management screen as seen in the Cybereason Defense Platform

The new process executed by the Redeemer build was detected and prevented by Anti-Ransomware:

MalOp Management screen as seen in the Cybereason Defense Platform

Analysis with Cybereason Defense Platform

When Anti-Ransomware is set to  “Detect” mode (which means that the ransomware is detected but not prevented on purpose), it is possible to analyze the Redeemer actions on the victim machine:

MalOp process as seen in the Cybereason Defense Platform

Redeemer ransomware 2.0 tries to:

  • Clear the Windows event logs
  • Stop services 
  • Kill processes

These actions can be observed from in the MalOp details for the process, as shown below:

Example of a command line to kill processes before encryption 

Example of a command line to stop services before encryption 

Example of a command line to clear the windows event log before encryption

Example of a command line to delete shadow copies

Cybereason Recommendations

The Cybereason Defense Platform detects and prevents Redeemer 2.0 infections through the Anti-ransomware feature. Cybereason recommends the following:

  • Enable Anti-Malware and set the Anti-Malware > Signatures mode to Prevent, Quarantine, or Disinfect
  • Enable Anti-Ransomware, set Anti-Ransomware to Prevent mode and enable canary files (with default settings)
  • Enable Application Control
  • Keep systems fully patched: Make sure your systems are patched in order to mitigate vulnerabilities
  • Regularly backup files and create a backup process and policy : Restoring your files from a backup is the fastest way to regain access to your data

About the Researcher

Mark Tsipershtein, Security Operations Analyst at Cybereason

Mark Tsipershtein, a cyber security analyst at the Cybereason Security Research Team, focuses on analysis automation and infrastructure. Mark has more than 20 years of experience in SQA, automation, and security testing.