Ransomware
Investigating BlackSuit Ransomware’s Similarities to Royal
In this blog entry, we analyze BlackSuit ransomware and how it compares to Royal Ransomware.
Royal ransomware, which is already one of the most notable ransomware families of 2022, has gained additional notoriety in early May 2023 after it was used to attack IT systems in Dallas, Texas. Around the same period, several researchers on Twitter came across a new ransomware family called BlackSuit that targeted both Windows and Linux users. Additional Twitter posts mentioned connections between BlackSuit and Royal, which piqued our interest. We managed to retrieve and analyze a Windows 32-bit sample of the ransomware from Twitter.
In this blog entry, we analyze BlackSuit ransomware and how it compares to Royal Ransomware.
Encryption and leak site details
Before delving into the main comparison between the two ransomware families, let’s first examine the encryption and leak site details of BlackSuit.
BlackSuit appends the blacksuit file extension to the files it encrypts, drops its ransom note into the directory, and lists its TOR chat site in the ransom note along with a unique ID for each of its victims.
Its operators also set up a data leak site as part of their two-pronged extortion strategy to coerce victims into paying the ransom demand. Note that there is just a single victim currently listed on the leak site as of the time of writing.
Comparison between Royal ESXi and BlackSuit ESXi variants
One of the BlackSuit ransomware samples we analyzed is an x64 ESXi version targeting Linux machines. An earlier post on Twitter revealed that YARA rules designed for BlackSuit’s Linux variant matched samples of the Royal ransomware Linux variant.
After comparing both samples of the Royal and BlackSuit ransomware, it became apparent to us that they have an extremely high degree of similarity to each other. In fact, they’re nearly identical, with 98% similarities in functions, 99.5% similarities in blocks, and 98.9% similarities in jumps based on BinDiff, a comparison tool for binary files.
Further analysis found that BlackSuit employs command-line arguments that have a similar function to those used by Royal. However, there are some differences: The strings used in the arguments are different, with BlackSuit also including additional arguments not found in Royal.
Royal Argument | BlackSuit Argument | Description |
---|---|---|
-id {32-byte characters} | -name {32-byte characters} | Used as the victim’s ID, which will be appended to the TOR link found in the dropped ransom note. The process exits if the argument is not provided, or if the provided characters do not have a length of 32 bytes |
-ep | -percent {0-100} | Used to define the encryption parameter |
-path {target path} | -p {target path} | Used to specify a target directory to encrypt |
(Not in Royal) | -thrcount | Used to create a specified number of threads depending on infected machine‘s processor count |
(Not in Royal) | -skip {text file} | Used to specify a text file containing folders to skip |
-stopvm | -killvm | Used to terminate VM-linked processes via the EXSCLi command |
-vmonly | -allfiles | Encrypt all files |
(Not in Royal) | -noprotect | CheckProcStarted |
/bin/sh -c ps > PS_list | ||
does not drop the file PID | ||
does not check if the process has already been started | ||
-fork | -vmsyslog | Used to create fork processes and terminate watchdog timers |
Does not terminate processes with the string vmsyslogd in its name | ||
-logs | -demonoff | Used to display terminal logs |
Table 1. A comparison of arguments for the Linux versions of BlackSuit and Royal
Meanwhile, the skip argument is used to indicate a text file that contains a list of folders to be skipped.
During file enumeration and encryption, each respective ransomware family avoids files with the following extensions and filenames:
Royal | BlackSuit |
---|---|
|
|
Table 2. List of extensions and filenames skipped by both BlackSuit and Royal
BlackSuit ransomware targets the following extensions if the –allfiles argument is not provided:
- .vmem
- .vmdk
- .nvram
- .vmsd
- .vmsn
- .vmss
- .vmtm
- .vmxf
- .vmxf
- .vmx
Intermittent encryption process
The binaries for both BlackSuit and Royal use OpenSSL’s AES for encryption and employ similar intermittent encryption techniques to accelerate the encryption of the victim’s files.
Both BlackSuit and Royal prepare the files for encryption by rounding up the file size to the nearest multiple of 16, after which 41 bytes are added, possibly to account for the encryption header and other metadata.
Next, a check is performed for the file being encrypted to determine if it has a size that is greater than 0x40000h (approximately 262KB). If this condition is met, it will use the value set using -percent, which is represented here by the i_ep variable. If not, it will use the default, which is 100.
The number of bytes to be used for intermittent encryption is then calculated using the same formula found in the Linux version of Royal ransomware:
|
The file size is again checked to calculate the amount of space to be allocated for the data and metadata. Finally, the keys to be used for encryption are prepared.
In the case of BlackSuit, as we previously mentioned, it appends the extension “.blacksuit” to encrypted files and drops a ransom note in the directory where the files are located.
Comparison between Royal Win32 and BlackSuit Win32 variants
In addition to the Linux-based sample, we also analyzed a Windows 32-bit version of BlackSuit, which also exhibits significant similarities with its Royal ransomware counterpart (93.2% similarity in functions, 99.3% in basic blocks, and 98.4% in jumps based on BinDiff).
Our analysis found that BlackSuit accepts the following command-line arguments:
Royal Arguments | BlackSuit Arguments | Description |
---|---|---|
-path {target path} | -p {target path} | If provided, will only encrypt the contents of the target path |
-id {32-byte characters} | -name {32-byte characters} | Used as the victim’s ID, which will be appended to the TOR link found in the dropped ransom note. The process exits if the argument is not provided, or if the provided characters do not have a length of 32 bytes |
-ep | -percent {0 to 100} | Used to define encyption parameters |
(Not in Royal) | -list {text files} | Used to specify a text file containing the target directories to encrypt |
(Not in Royal) | -delete | Used to delete itself |
-networkonly | -network | Used to encrypt file shares connected to the system |
-localonly | -local | Used to encrypt the local system only |
-disablesafeboot | -disablesafeboot | Used to disable safeboot |
-noprotect | -noprotect | Used to disable mutex creation |
Table 3. A comparison of arguments for the Win32 versions of BlackSuit and Royal
While BlackSuit introduces different argument strings compared to Royal, their purpose remains similar. BlackSuit combines arguments from various Windows versions of Royal Ransomware, while also introducing new arguments such as "-delete" and "-list" that are specific to itself.
The -delete argument uses the following command to continuously check for the existence of its file by looking for the filename:
cmd /v/c "set f={Malware File Name}&for /l %l in () do if exist !f! (del /f/a "!f!") else (exit)" |
If the file is found, it is immediately deleted. The command keeps running indefinitely until the file is deleted, at which point the loop will exit.
The -list argument is used to specify a text file containing target directories to encrypt. It loads the file using ReadFileFAPI then places the contents of the text file in a buffer. Note that the loaded text file is a sample text file we used for testing and not the format of the text file that will be loaded in an actual attack.
if –disablesafeboot is passed as an argument, it removes the "safeboot" value from the current boot entry in the Boot Configuration Data (BCD) and performs an immediate system restart via the following command:
“%System%\bcdedit.exe" /deletevalue {current} safeboot |
When encrypting network shares using the -network argument, BlackSuit will check if the IP address begins with the following numbers to ensure that it is encrypting local systems:
- 192.168.
- 10.
- 100.
- 172.
It avoids encrypting files with the following strings in their file path:
Royal | BlackSuit |
---|---|
|
|
Table 4. Royal and BlackSuit avoid encrypting files that have these strings
Royal | BlackSuit |
---|---|
|
|
Table 5. Royal and BlackSuit avoid encrypting files that contain these extensions
BlackSuit ransomware also deletes shadow copies using the following command:
"%System%\vssadmin.exe" Delete Shadows /All /Quiet |
Conclusion and insights
The emergence of BlackSuit ransomware (with its similarities to Royal) indicates that it is either a new variant developed by the same authors, a copycat using similar code, or an affiliate of the Royal ransomware gang that has implemented modifications to the original family.
One possibility for BlackSuit’s creation is that, since the threat actors behind Royal (and Conti before it) are one of the most active ransomware groups in operation today, this may have led to increased attention from other cybercriminals, who were then inspired to develop a similar ransomware in BlackSuit. Another option is that BlackSuit emerged from a splinter group within the original Royal ransomware gang.
Whatever the case may be, the emergence of another ransomware like BlackSuit provides further evidence that threat actors will always try to look for more effective tools for their attacks, from modifying existing code to developing unique ransomware families, to profit from their victims. As such, both organizations and individual users should remain vigilant when it comes to protecting their files and data from ransomware attacks.
Recommendations and solutions
Organizations can defend against ransomware attacks by implementing a comprehensive security framework that directs resources towards establishing a strong defense strategy. Here are some recommendations:
- Create an inventory of assets and data
- Identify authorized and unauthorized devices and software
- Conduct audits of event and incident logs
- Manage hardware and software configurations
- Grant administrative privileges and access only when necessary
- Monitor network ports, protocols, and services
- Establish a whitelist of approved software applications
- Implement measures for data protection, backup, and recovery
- Enable multifactor authentication (MFA)
- Deploy up-to-date security solutions across all system layers
- Remain vigilant for early indications of an attack
By adopting a multi-pronged approach to securing potential entry points, such as endpoints, emails, websites, and networks, organizations can detect and defend against malicious elements and suspicious activities, effectively safeguarding themselves from ransomware attacks.
A multilayered approach can help organizations guard possible entry points into their system (endpoint, email, web, and network). Security solutions can detect malicious components and suspicious behavior, which can help protect enterprises.
- Trend Vision One™ provides multilayered protection and behavior detection, which helps block questionable behavior and tools before the ransomware can do any damage.
- Trend Micro Apex One™ offers next-level automated threat detection and response against advanced concerns such as fileless threats and ransomware, ensuring the protection of endpoints.
Indicators of Compromise (IOCs)
SHA256 | Detection name |
---|---|
90ae0c693f6ffd6dc5bb2d5a5ef078629c3d77f874b2d2ebd9e109d8ca049f2c | Ransom.Win32.BLACKSUIT.THEODBC |
1c849adcccad4643303297fb66bfe81c5536be39a87601d67664af1d14e02b9e | Ransom.Linux.BLACKSUIT.THEODBC |
6ac8e7384767d1cb6792e62e09efc31a07398ca2043652ab11c090e6a585b310 | Ransom.Win32.ROYAL.AA |
4d7f6c6a051ecb1f8410243cd6941b339570165ebcfd3cc7db48d2a924874e99 | Ransom.Win32.ROYAL.SMYECJYT |
b57e5f0c857e807a03770feb4d3aa254d2c4c8c8d9e08687796be30e2093286c | Ransom.Linux.ROYAL.THBOBBC |