• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – CVE-2019-2426 – Oracle Java SE Information Disclosure Vulnerability
January 23, 2019
Rewterz Threat Advisory – Russian language Malspam Campaign spreading Redaman Banking Malware
January 25, 2019

Rewterz Threat Alert – New Rumba STOP Ransomware Being Installed by Software Cracks

January 23, 2019

SEVERITY: High

 

 

ANALYSIS SUMMARY

 

 

Adware installers disguised as cracks have been used for a massive distribution of the STOP ransomware during the last month. This campaign continues with a new variant released over the past few days that appends the .rumba extension to the names of encrypted files.

 

 

Using adware bundles and software cracks as a new distribution method, STOP has become one of the most prolific ransomware infections we have seen in quite a while. First starting with the .djvu extension, then switching to the .tro extension, a common practice used by sites that distribute software cracks is to utilize adware bundles in order to generate revenue. These bundles will normally install unwanted extensions, adware, clickers, and miners, but one bundler appears to
be turning a blind eye and has started distributing the STOP Ransomware as well.

 

 

Some of the reported cracks that are installing this ransomware include Windows activation cracks such as KMSPico, Cubase, Photoshop, antivirus software, and cracks for many other popular copyrighted software. From reports by infected users, it does not appear to be one particular crack site that is affected, but many different ones who are pushing similar adware bundles.

 

 

 

 

In this new variant, not much has changed and the developers continue to use the same approach. The main difference is in this version the ransomware will append the .rumba extension to a file’s name after it is encrypted as shown below.

 

 

 

 

In each folder that a file is encrypted, the ransomware will create a ransom note named _openme.txt that contains instructions on how to contact the attacker for payment instructions.

 

 

 

 

IMPACT

 

 

Encryption of personal information

 

 

INDICATORS OF COMPROMISE

 

 

Extension

 

.rumba

 

 

Malware Hash (MD5/SHA1/SH256)

 

2b43163fdbeab448c292abb4e34dc395175b80328232d4fd884011ee525cedb6

 

 

REMEDIATION

 

 

It is recommended to install legitimate and well-reputed adware blocker available in different browsers.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.