Intended Audience:

  • CISO / CIO / Security Directors
  • Threat Intelligence Analysts

Technical Content: Low

Summary

 On March 4, 2017, a member of the underground forum Exploit with the username “Dereck1” mentioned a new ransomware variant called “Karmen.” Further investigation revealed that “DevBitox,” a Russian-speaking cyber criminal, was the seller behind the Karmen malware on underground forums in March 2017. However, the first cases of infections with Karmen were reported as early as December of 2016 by victims in Germany and the United States.

cryptolocker

Source: https://app.recordedfuture.com/live/sc/2lbNf7AT41J4

Above are results from a query for mentions of “Karmen” by DevBitox or Dereck1 on Dark Web / Special Access sources in Recorded Future.

Kermen

Source: https://app.recordedfuture.com/live/sc/49iWV693EbDg

 Above are mentions of the Karmen malware on the web over time.

 Background

 Karmen malware is  “ransomware as a service” (RaaS) derived from “Hidden Tear,” an open source ransomware project, available for purchase by anyone. As is typical for ransomware infections, Karmen encrypts files on the infected machine using the strong AES-256 encryption protocol, making them inaccessible to the user and may trigger a ransom note or instructions demanding that the user pay a large sum of money to obtain the decryption key from the attacker. A notable feature of Karmen is that it automatically deletes the decryptor if a sandbox environment or analysis software is detected on the victim’s computer.

 Files encrypted

When a user’s computer is infected with Karmen, they’ll see the above message, warning them not to interfere with the malware. Below are screenshots of the affiliate’s page seen by purchasers of the Karmen RaaS.

Setting

The Karmen interface allows users to change the malware’s settings using a control panel that requires minimal technical knowledge.

Setting

The “Clients” page tracks computers infected with the virus.

Dashboard

The dashboard gives the user an overview of relevant information including the number of clients they have, how much money they’ve earned, and updates to the Karmen software.

Description of Karmen Malware provided by DevBitox

– Multi-threaded

– Multi-language

– Supports .NET 4.0 and newer versions

– Encryption algorithm: AES-256

– Adaptive admin panel

– Encrypts all discs and files

– Separate BTC wallet for each victim

– Small size

– Automatic deletion of loader

– Automatic deletion of malware (after payment was received)

– Minimal connection with control server

– Robust control panel

– Almost FUD (1/35)

– Automatic file decryption after received payment

– T2W compatible

– File extensions remain the same

– Detection of Anti-debugger/analyzers/VM/SandBox

– Automatic deletion of decryptor if sandbox environment or an analyzing software is detected on victim’s computer

– Light version – Obfuscation and autoloader only

– Full version – Detection of analyzing software

Notes:

– Application .NET dependent

– Support Infrastructure: PHP 5.6, MySQL, “file()” function must be activated on the server

– Rebuild – Free (up to three copies)

– Updates – Free

Price $175

Known Indicators:

 File name: joise.exe

File name: n_karmen.exe

File name: build.exe

File MD5: 9c8fc334a1dc660609f30c077431b547

File MD5: 56b66af869248749b2f445be8f9f4a9d

File MD5: 521983cb92cc0b424e58aff11ae9380b

SHA1: dc875c083c5f70e74dc47373a4ce0df6ccd8ae88

SHA1: f79f6d4dd6058f58b384390f0932f1e4f4d0fecf

SHA1: 2a3477ea2d09c855591b3d16cfff8733935db50b

https://www.youtube.com/watch?v=xUkyCyyPsdA&feature=youtu.be

Video presentation of Karmen Ransomware operation, provided by DevBitox.

The seller has admitted he was only involved with web development and control panel design; the malware is utilizing the open source encryption project “Hidden Tear” and was created by an unknown associate operating out of Germany.

As of this writing, twenty copies of Karmen malware were sold by DevBitox, while only five copies remain available to potential buyers.

Poison

Antivirus scanning results provided by DevBitox.

ISBuzz Staff
Expert Comments : 1
Security Articles : 12413

ISBuzz staff provides a brief synopsis and summary of the breaking information security news and topics to allow information security experts to provide their expert commentary on the breaking news or the topics.
Subscribe
Notify of
guest

0 Expert Comments
Inline Feedbacks
View all comments
Information Security Buzz
0
Would love your thoughts, please comment.x
()
x