Dark Web Profile: Ymir Ransomware

Summary:
The emergence of Ymir ransomware introduces sophisticated tactics that challenge traditional cybersecurity defenses. Originating from the RustyStealer malware, Ymir operates stealthily in memory, making it a significant threat to organizations globally. This article outlines its operational tactics, impacts, and essential mitigation measures.
#YmirRansomware #CyberThreats #AdvancedMalware

Keypoints:

  • Ymir ransomware is a new strain identified by Kaspersky, first observed in July 2024.
  • It gains initial access through the RustyStealer infostealer malware.
  • Ymir operates primarily in memory to avoid detection and minimize traces on hard drives.
  • It employs the ChaCha20 encryption algorithm to lock files, targeting critical business file types.
  • The ransomware has a global reach, affecting countries like Colombia, Pakistan, Australia, and Ukraine.
  • Ymir uses unique elements such as the African Lingala language in its code comments.
  • To defend against Ymir, organizations should adopt a multi-layered security strategy, including patch management and employee training.

  • MITRE Techniques

  • File and Directory Discovery (T1083): Used to gather information about files and directories on the system.
  • System Information Discovery (T1082): Gathers details about the system’s configuration and environment.
  • Command and Scripting Interpreter: PowerShell (T1059.001): Executes commands and scripts using PowerShell.
  • Data Encrypted for Impact (T1486): Encrypts files to disrupt operations and demand ransom.
  • Virtualization/Sandbox Evasion: Time Based Evasion (T1497.003): Evades detection by manipulating time-based checks in virtual environments.
  • Indicator Removal: File Deletion (T1070.004): Deletes files to cover tracks and hinder forensic analysis.
  • Process Discovery (T1057): Identifies running processes on the system.
  • Shared Modules (T1129): Utilizes shared modules to execute malicious payloads.
  • Obfuscated Files or Information (T1027): Uses obfuscation techniques to hide malicious code.

  • IoC:

  • [File Hash] 3648359ebae8ce7cacae1e631103659f5a8c630e
  • [File Hash] fe6de75d6042de714c28c0a3c0816b37e0fa4bb3
  • [File Hash] f954d1b1d13a5e4f62f108c9965707a2aa2a3c89 (INCIDENT_REPORT.pdf)
  • [File Hash] 5ee1befc69d120976a60a97d3254e9eb
  • [File Hash] 5384d704fadf229d08eab696404cbba6
  • [File Hash] 39df773139f505657d11749804953be5
  • [File Hash] 8287d54c83db03b8adcdf1409f5d1c9abb1693ac8d000b5ae75b3a296cb3061c
  • [File Hash] 51ffc0b7358b7611492ef458fdf9b97f121e49e70f86a6b53b93ed923b707a03
  • [File Hash] b087e1309f3eab6302d7503079af1ad6af06d70a932f7a6ae1421b942048e28a
  • [IP Address] 74.50.84.181:443
  • [IP Address] 94.158.244.69:443
  • [IP Address] 5.255.117.134:80
  • [IP Address] 85.239.61.60


  • Full Research: https://socradar.io/dark-web-profile-ymir-ransomware/