Snatch Ransomware Alert

Cyber Security Threat Summary:
Snatch is a ransomware group primarily targeting Windows-based systems. They employ various tactics, including exploiting vulnerabilities, brute force attacks, and data exfiltration to compromise and extort victims. Snatch operates under a ransomware-as-a-service (RaaS) model and has targeted critical infrastructure sectors such as Defense Industrial Base (DIB), Food and Agriculture, and Information Technology. The group utilizes a customized ransomware variant known for rebooting devices into Safe Mode to evade detection. They engage in double extortion, threatening victims with data exposure if ransoms are not paid. Recent reports indicate the existence of an extortion site associated with Snatch.

Security Officer Comments:
Snatch poses a significant threat to Windows-based systems, and its adaptation to current cybercriminal trends, use of double extortion, and willingness to purchase stolen data make it a formidable adversary. Organizations must prioritize robust cybersecurity measures, including regular patching, strong authentication practices, and data backup strategies to mitigate the risk of falling victim to Snatch ransomware attacks.

Suggested Correction(s):

  • Patch and Update: Keep systems and software up-to-date with the latest security patches to minimize vulnerabilities that ransomware groups like Snatch might exploit.
  • Strong Authentication: Enforce strong password policies and implement multi-factor authentication (MFA) to protect against brute force attacks.
  • Data Backup: Regularly back up critical data and ensure backups are isolated from the network to prevent ransomware encryption. Test data restoration procedures.
  • Endpoint Protection: Use reputable antivirus and endpoint protection solutions to detect and block malicious activity.
  • Email Security: Implement email filtering solutions to detect and block phishing emails, which are often used as an initial attack vector.
  • Network Monitoring: Continuously monitor network traffic for suspicious activity, especially over commonly used ports like 443.
  • Access Control: Limit user privileges and access rights to minimize the impact of a potential compromise.
  • Incident Response Plan: Develop and practice an incident response plan to respond effectively in case of a ransomware attack.
IOCS:
Email Domains and Addresses:
  • sezname[.]cz
  • cock[.]li
  • airmail[.]cc
  • tutanota[.]com / tutamail[.]com / tuta[.]io
  • mail[.]fr
  • keemail[.]me
  • protonmail[.]com / proton[.]me
  • swisscows[.]email
Email Addresses:
  • sn.tchnews.top@protonmail[.]me
  • funny385@swisscows[.]email
  • funny385@proton[.]me
  • russellrspeck@seznam[.]cz
  • russellrspeck@protonmail[.]com
  • Mailz13MoraleS@proton[.]me
  • datasto100@tutanota[.]com
  • snatch.vip@protonmail[.]com
TOX Messaging IDs:
  • CAB3D74D1DADE95B52928E4D9DFC003FF5ADB2E082F59377D049A91952E8BB3B419DB2FA9D3F
  • 7229828E766B9058D329B2B4BC0EDDD11612CBCCFA4811532CABC76ACF703074E0D1501F8418
  • 83E6E3CFEC0E4C8E7F7B6E01F6E86CF70AE8D4E75A59126A2C52FE9F568B4072CA78EF2B3C97
  • 0FF26770BFAEAD95194506E6970CC1C395B04159038D785DE316F05CE6DE67324C6038727A58
Folder Creation:

C:$SysReset

Filenames (SHA-256):


  • qesbdksdvnotrjnexutx.bat: 0965cb8ee38adedd9ba06bdad9220a35890c2df0e4c78d0559cd6da653bf740f
  • eqbglqcngblqnl.bat: 1fbdb97893d09d59575c3ef95df3c929fe6b6ddf1b273283e4efadf94cdc802d
  • safe.exe: 5950b4e27554585123d7fca44e83169375c6001201e3bf26e57d079437e70bcd
  • safe.exe: 7018240d67fd11847c7f9737eaaae45794b37a5c27ffd02beaacaf6ae13352b3
  • safe.exe: 28e82f28d0b9eb6a53d22983e21a9505ada925ebb61382fabebd76b8c4acff7c
  • safe.exe: fc31043b5f079ce88385883668eeebba76a62f77954a960fb03bf46f47dbb066
  • DefenderControl.exe: a201f7f81277e28c0bdd680427b979aee70e42e8a98c67f11e7c83d02f8fe7ae
  • PRETTYOCEANApplicationdrs.bi: 6992aaad3c47b938309fc1e6f37179eb51f028536f8afc02e4986312e29220c0
  • Setup.exe: 510e9fa38a08d446189c34fe6125295f410b36f00aceb65e7b4508e9d7c4e1d1
  • WRSA.exe: ed0fd61bf82660a69f5bfe0e66457cfe56d66dd2b310e9e97657c37779aef65d
  • ghnhfglwaplf.bat: 2155a029a024a2ffa4eff9108ac15c7db527ca1c8f89ccfd94cc3a70b77cfc57
  • nllraq.bat: 251427c578eaa814f07037fbe6e388b3bc86ed3800d7887c9d24e7b94176e30d
  • ygariiwfenmqteiwcr.bat: 3295f5029f9c9549a584fa13bc6c25520b4ff9a4b2feb1d9e935cc9e4e0f0924
  • bsfyqgqeauegwyfvtp.bat: 6c9d8c577dddf9cc480f330617e263a6ee4461651b4dec1f7215bda77df911e7
  • rgibdcghzwpk.bat: 84e1476c6b21531de62bbac67e52ab2ac14aa7a30f504ecf33e6b62aa33d1fe5
  • pxyicmajjlqrtgcnhi.bat: a80c7fe1f88cf24ad4c55910a9f2189f1eedad25d7d0fd53dbfe6bdd68912a84
  • evhgpp.bat: b998a8c15cc19c8c31c89b30f692a40b14d7a6c09233eb976c07f19a84eccb40
  • eqbglqcngblqnl.bat: 1fbdb97893d09d59575c3ef95df3c929fe6b6ddf1b273283e4efadf94cdc802d
  • qesbdksdvnotrjnexutx.bat: 0965cb8ee38adedd9ba06bdad9220a35890c2df0e4c78d0559cd6da653bf740f


  • Filenames (SHA-1):


    safe.exe: c8a0060290715f266c89a21480fed08133ea2614

    Commands:


  • wmiadap.exe /F /T /R
  • %windir%\System32\svchost.eve –k WerSvcGroup
  • conhost.exe 0xFFFFFFFF -ForceV1
  • vssadmin delete shadows /all /quiet
  • bcdedit.exe /set {current} safeboot minimal
  • REG ADD HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\VSS /VE /T REG_SZ /F /D Service
  • REG ADD HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mXoRpcSsx /VE /T REG_SZ /F /D Service
  • REG QUERY HKLM\SYSTEM\CurrentControlSet\Control /v SystemStartOptions
  • %CONHOST% "1088015358-1778111623-130642814


  • For more information, MITRE tags / technical analysis please see the attached PDF

    Link(s):
    https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-263a