Karmen Ransomware Variant Introduced By Russian Hacker

By   ISBuzz Team
Writer , Information Security Buzz | Apr 18, 2017 11:49 pm PST

Intended Audience:

  • CISO / CIO / Security Directors
  • Threat Intelligence Analysts

Technical Content: Low


 On March 4, 2017, a member of the underground forum Exploit with the username “Dereck1” mentioned a new ransomware variant called “Karmen.” Further investigation revealed that “DevBitox,” a Russian-speaking cyber criminal, was the seller behind the Karmen malware on underground forums in March 2017. However, the first cases of infections with Karmen were reported as early as December of 2016 by victims in Germany and the United States.


Source: https://app.recordedfuture.com/live/sc/2lbNf7AT41J4

Above are results from a query for mentions of “Karmen” by DevBitox or Dereck1 on Dark Web / Special Access sources in Recorded Future.


Source: https://app.recordedfuture.com/live/sc/49iWV693EbDg

 Above are mentions of the Karmen malware on the web over time.


 Karmen malware is  “ransomware as a service” (RaaS) derived from “Hidden Tear,” an open source ransomware project, available for purchase by anyone. As is typical for ransomware infections, Karmen encrypts files on the infected machine using the strong AES-256 encryption protocol, making them inaccessible to the user and may trigger a ransom note or instructions demanding that the user pay a large sum of money to obtain the decryption key from the attacker. A notable feature of Karmen is that it automatically deletes the decryptor if a sandbox environment or analysis software is detected on the victim’s computer.

 Files encrypted

When a user’s computer is infected with Karmen, they’ll see the above message, warning them not to interfere with the malware. Below are screenshots of the affiliate’s page seen by purchasers of the Karmen RaaS.


The Karmen interface allows users to change the malware’s settings using a control panel that requires minimal technical knowledge.


The “Clients” page tracks computers infected with the virus.


The dashboard gives the user an overview of relevant information including the number of clients they have, how much money they’ve earned, and updates to the Karmen software.

Description of Karmen Malware provided by DevBitox

– Multi-threaded

– Multi-language

– Supports .NET 4.0 and newer versions

– Encryption algorithm: AES-256

– Adaptive admin panel

– Encrypts all discs and files

– Separate BTC wallet for each victim

– Small size

– Automatic deletion of loader

– Automatic deletion of malware (after payment was received)

– Minimal connection with control server

– Robust control panel

– Almost FUD (1/35)

– Automatic file decryption after received payment

– T2W compatible

– File extensions remain the same

– Detection of Anti-debugger/analyzers/VM/SandBox

– Automatic deletion of decryptor if sandbox environment or an analyzing software is detected on victim’s computer

– Light version – Obfuscation and autoloader only

– Full version – Detection of analyzing software


– Application .NET dependent

– Support Infrastructure: PHP 5.6, MySQL, “file()” function must be activated on the server

– Rebuild – Free (up to three copies)

– Updates – Free

Price $175

Known Indicators:

 File name: joise.exe

File name: n_karmen.exe

File name: build.exe

File MD5: 9c8fc334a1dc660609f30c077431b547

File MD5: 56b66af869248749b2f445be8f9f4a9d

File MD5: 521983cb92cc0b424e58aff11ae9380b

SHA1: dc875c083c5f70e74dc47373a4ce0df6ccd8ae88

SHA1: f79f6d4dd6058f58b384390f0932f1e4f4d0fecf

SHA1: 2a3477ea2d09c855591b3d16cfff8733935db50b


Video presentation of Karmen Ransomware operation, provided by DevBitox.

The seller has admitted he was only involved with web development and control panel design; the malware is utilizing the open source encryption project “Hidden Tear” and was created by an unknown associate operating out of Germany.

As of this writing, twenty copies of Karmen malware were sold by DevBitox, while only five copies remain available to potential buyers.


Antivirus scanning results provided by DevBitox.