HomeCII/OTKransom's Invasion via DLL Side-Loading

Kransom’s Invasion via DLL Side-Loading

Published on

spot_img

Researchers at ANY.RUN have recently uncovered a cleverly disguised ransomware called Kransom, which hides within the StarRail game using DLL side-loading and a legitimate certificate from COGNOSPHERE PTE. LTD. This sophisticated malware is designed to evade traditional detection methods by posing as a harmless game.

The Kransom ransomware operates by utilizing DLL side-loading, a technique where a legitimate executable file loads a malicious DLL file, allowing the ransomware to execute its encrypted payload. By impersonating a game, this malware is able to trick users into unknowingly installing and activating the ransomware on their systems.

What makes Kransom particularly deceptive is its use of a legitimate certificate from COGNOSPHERE PTE. LTD. This certificate gives the impression that the software is safe and trustworthy, allowing the malware to bypass security measures and avoid detection. Once the StarRailBase.dll file is loaded by the executable, the ransomware attack is initiated, leaving users vulnerable to data encryption and extortion.

To better understand how Kransom ransomware works, security analysts can upload a sample of the malware to a sandbox environment like ANY.RUN. This interactive sandbox allows for a comprehensive analysis of the ransomware’s execution process, from its initial stages to the completion of its payload. By examining the encrypted payload within the DLL file, analysts can gain valuable insights into the malicious content and behavior of the ransomware.

Upon activation, Kransom displays a message to the user, directing them to contact HoYoverse for solutions to their “problems.” This ominous message serves as a ransom note, indicating that the user’s files have been encrypted and that they must comply with the cybercriminal’s demands to regain access.

For those interested in further exploring Kransom ransomware and its capabilities, ANY.RUN offers a TI Lookup tool that allows for additional analysis of samples within the sandbox environment. By leveraging this tool, users can gain a deeper understanding of the ransomware’s functionality and potential impact on their systems.

In conclusion, Kransom ransomware represents a significant threat to users, as it leverages deceptive tactics to evade detection and carry out malicious activities. By remaining vigilant and utilizing tools like ANY.RUN’s sandbox environment for analysis, users and security professionals can better protect themselves against evolving cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...