# REvil’s new Linux version **[cybersecurity.att.com/blogs/labs-research/revils-new-linux-version](https://cybersecurity.att.com/blogs/labs-research/revils-new-linux-version)** [1. AT&T Cybersecurity](https://cybersecurity.att.com/) [2. Blog](https://cybersecurity.att.com/blogs) July 1, 2021 | [Fernando Martinez](https://cybersecurity.att.com/blogs/author/fmartinez) _This blog was jointly authored with Ofer Caspi._ ## Executive summary The ransomware-as-a-service (RaaS) operation behind REvil have become one of the most prolific and successful threat groups since the ransomware first appeared in May 2019. REvil has been primarily used to target Windows systems. However, new samples have been identified targeting Linux systems. AT&T Alien Labs™ is closely monitoring the ransomware landscape and has already identified four of these [samples in the wild during the last month, after receiving a tip from](https://twitter.com/VK_Intel/status/1409598638981058564?s=20) [MalwareHuntingTeam. The purpose of](https://twitter.com/malwrhunterteam/status/1409577829289934851?s=20) this blog is to share recent findings and a summary of the adversary, malware family, and detection options. ## Key Takeaways: REvil ransomware authors have expanded their arsenal to include Linux ransomware, which allows them to target ESXi and NAS devices. The new Linux version has similarities to the Windows version, which has impacted companies such [as JBS, Acer, and Travelex, as already reported by the FBI and the media.](https://www.zdnet.com/article/fbi-attributes-jbs-ransomware-attack-to-revil/) ## Background ----- REvil is also known as Sodinokibi or Sodin. It is a ransomware family operated as a ransomware-as-aservice (RaaS). Deployments of REvil were first observed in April 2019, exploiting a published vulnerability in Oracle WebLogic (CVE-2019-2725). Since then, REvil has become one of the most prolific RaaS [groups, after being attributed ransom attacks to JBS,](https://www.zdnet.com/article/fbi-attributes-jbs-ransomware-attack-to-revil/) [Acer,](https://www.bleepingcomputer.com/news/security/computer-giant-acer-hit-by-50-million-ransomware-attack/) [Travelex, and the most recent one U.K.-based](https://www.bbc.com/news/business-51017852) [fashion brand French Connection this week.](https://threatpost.com/fcuk-fashion-medical-diagnostics-revil/167245/) **REVIL Victims** **Company** **Industry** **Country** National Western Life Financial United States Eurecat (Eurecat SA) Energy France, United States Light S.A. Energy Brazil Quest Worldwide Consulting Australia Brown Forman Corporation Food and Beverage Services United States Arafmi Healthcare Australia 4datanet.com Information Technology United States malabs.com Technology United States Viva Resorts Hospitality United States Schramm Inc. Manufacturing United States CAT RICAMBI SR Automotive Italy Quanta Computer Information Technology Taiwan JBS Food and Beverage Services Brasil, United States Acer Information Technology Taiwan Travelex Financial United Kingdom French Connection Fashion United Kingdom ----- Grupo Fleury Healthcare Brazil Invenergy Energy United States Ransomware-as-a-service is a method for individuals to purchase prebuilt malware families for their own malicious use. RaaS has been sold on the dark web and has been the approach used by a variety of other criminal groups, such as DarkSide. One thing to keep in mind is RaaS is not limited to buyers who lack their own capabilities. For example, a highly skilled adversarial team supporting a nation state could make use of RaaS families to gain access into a targeted network to avoid pre- and post- compromise attribution and objective identification. ## Analysis The threat actors behind REvil ransomware have expanded their arsenal to include Linux ransomware. As [announced on a dark web blog and reported by AdvIntel in early May 2021, REvil has ported their](https://twitter.com/y_advintel/status/1391450354051653633) Windows ransomware version to the Linux architecture. These software upgrades follow the trend seen in other popular RaaS groups, like DarkSide, where they have added Linux capabilities to include ESXi in their scope of potential targets. The hypervisor ESXi allows multiple virtual machines (VM) to share the same hard drive storage. However, this also enables attackers to encrypt the centralized virtual hard drives used to store data from across VMs, potentially causing disruptions to companies. According to the blog post, in addition to targeting ESXi, REvil is also targeting NAS devices as another storage platform with the potential to highly impact the affected companies. In late May 2021 the first REvil ransomware samples affecting *nix systems and ESXi were observed in the wild. The samples are ELF64 executables, with similarities to the Windows REvil executable, being the most noticeable among the configuration options. Before encrypting all the files, REvil runs the esxcli command line tool to list all running ESXi VMs and terminate them. By doing this, the attacker ensures no other VM is handling the files to be encrypted, avoiding corruption issues of the encrypted files. However, the executable has a specific parameter to run in silent mode, which avoids debugging without stopping any VMs. Figure 1: ESXi command to kill running VMs, as captured by Alien Labs. In addition to the above-mentioned parameter, the threat actor can specify the number of threads to use (the default value is 50) and the path to encrypt. (By default, the malware will encrypt the current directory and its subfolders.) During execution, the malware will first check if its configuration exists. The configuration file format is very similar to the one observed for REvil Windows samples, but with fewer fields. Some of the fields presented in both versions include: Pk: Base64-encoded value containing the attacker's public key used to encrypt files Sub: 7987 representing the affiliate identifier Dbg: Determines if the victim is Russian, terminating the execution if the language set in the victim’s system is not the expected one ----- Nbody: Ransom note body contents encoded in base64; decoded contents are shown in Figure 3 Nname: Ransom note filename Rdmcnt: Unique value not previously seen in REvil configurations Ext: Encrypted extension, which appears to be five random character; the observed extensions include .rhkrc, .qoxaq, .naixq, and . 7rspj. Figure 2: Hard-coded config file, as captured by Alien Labs. Figure 3: Hard-coded ransom note after decoding, as captured by Alien Labs. The malware will loop through the target folder, encrypting the files in it. Before encryption, it will check to see if the file has already been encrypted by looking at the filename extension. During encryption, the malware will generate a 64 bytes XOR key, based on the pk key given in the config file. It will use this key during the encryption process. After encryption, the malware will write the generated key “IV” at the end of each file and leave a ransom note in each folder. ----- Figure 4: Main encryption routine, as captured by Alien Labs. Figure 5: Main encryption routine, as captured by Alien Labs. The malware will log all the files it goes through, stating if the file was encrypted or if it was unable to encrypt due to OS protection. ----- Figure 6: Encryption logs, as captured by Alien Labs. Figure 7: Execution output, as captured by Alien Labs. . ## Conclusion ----- The threat actors behind REvil RaaS have rapidly developed a Linux version to compete against the recently released Linux version of DarkSide. It is hard to clarify if these two RaaS are competing against [each other or collaborating team members, as stated by other security researchers. Nevertheless, both](https://krebsonsecurity.com/2021/06/justice-dept-claws-back-2-3m-paid-by-colonial-pipeline-to-ransomware-gang/) actors have been very active in the ransomware landscape during the last months, and these upgrades will keep them in the spotlight due to the increased attacking spectrum. ## Appendix A. Detection Methods The following associated detection methods are in use by Alien Labs. They can be used by readers to tune or deploy detections in their own environments or for aiding additional research. YARA RULES ``` rule REvilLinux { meta: author = "AlienLabs" description = "REvil Linux" sha256 = "ea1872b2835128e3cb49a0bc27e4727ca33c4e6eba1e80422db19b505f965bc4 " strings: $func = "File [%s] was NOT encrypted" $sleep = "esxcli" $re = "[%s] is protected by os" $a3 = "Error create note in dir %s" condition: uint32(0) == 0x464C457F and 3 of them } ## Appendix B. Associated Indicators (IOCs) ``` The following technical indicators are associated with the reported intelligence. A list of indicators is also [available in the OTX Pulse. Please note, the pulse may include other activities related but out of the scope](https://otx.alienvault.com/pulse/60da2c80aa5400db8f1561d5) of the report. TYPE INDICATOR DESCRIPTION SHA256 ea1872b2835128e3cb49a0bc27e4727ca33c4e6eba1e80422db19b505f965bc4 REvil Linux sample ----- SHA256 d6762eff16452434ac1acc127f082906cc1ae5b0ff026d0d4fe725711db47763 REvil Linux sample SHA256 796800face046765bd79f267c56a6c93ee2800b76d7f38ad96e5acb92599fcd4 REvil Linux sample SHA256 3d375d0ead2b63168de86ca2649360d9dcff75b3e0ffa2cf1e50816ec92b3b7d REvil Linux sample ## Appendix C. Mapped to MITRE ATT&CK [The findings of this report are mapped to the following MITRE ATT&CK Matrix techniques:](https://attack.mitre.org/) TA0043: Reconnaissance TA1592: Gather Victim Host Information TA0042: Resource Development T1583: Acquire Infrastructure T1587: Develop Capabilities TA0005: Defense Evasion T1027: Obfuscated Files or Information TA0007: Discovery T1083: File and Directory Discovery TA0009: Collection T1005: Data from Local System TA0040: Impact T1486: Data Encrypted for Impact ### Share this with others Tags: [malware,](https://cybersecurity.att.com/blogs/tag/malware) [alien labs,](https://cybersecurity.att.com/blogs/tag/alien+labs) [ransomware,](https://cybersecurity.att.com/blogs/tag/ransomware) [otx pulse,](https://cybersecurity.att.com/blogs/tag/otx+pulse) [security,](https://cybersecurity.att.com/blogs/tag/security) [labs,](https://cybersecurity.att.com/blogs/tag/labs) [linux,](https://cybersecurity.att.com/blogs/tag/linux) [raas,](https://cybersecurity.att.com/blogs/tag/raas) [revil](https://cybersecurity.att.com/blogs/tag/revil) -----