Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on May 22, 2023, 06:01:50 PM

Title: US-CERT- #StopRansomware: BianLian Ransomware Group
Post by: Netwörkheäd on May 22, 2023, 06:01:50 PM
#StopRansomware: BianLian Ransomware Group

Summary


Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and learn more about other ransomware threats and no-cost resources.


The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) are releasing this joint Cybersecurity Advisory to disseminate known BianLian ransomware and data extortion group IOCs and TTPs identified through FBI and ACSC investigations as of March 2023.





Actions to take today to mitigate cyber threats from BianLian ransomware and data extortion:

• Strictly limit the use of RDP and other remote desktop services.

• Disable command-line and scripting activities and permissions.

• Restrict usage of PowerShell and update Windows PowerShell or PowerShell Core to the latest version.



BianLian is a ransomware developer, deployer, and data extortion cybercriminal group that has targeted organizations in multiple U.S. critical infrastructure sectors since June 2022. They have also targeted Australian critical infrastructure sectors in addition to professional services and property development. The group gains access to victim systems through valid Remote Desktop Protocol (RDP) credentials, uses open-source tools and command-line scripting for discovery and credential harvesting, and exfiltrates victim data via File Transfer Protocol (FTP), Rclone, or Mega. BianLian group actors then extort money by threatening to release data if payment is not made. BianLian group originally employed a double-extortion model in which they encrypted victims' systems after exfiltrating the data; however, around January 2023, they shifted to primarily exfiltration-based extortion.


FBI, CISA, and ACSC encourage critical infrastructure organizations and small- and medium-sized organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of BianLian and other ransomware incidents.


Download the PDF version of this report (710kb):






   

    AA23-136A_StopRansomware_BianLian_Ransomware_Group.pdf
    (PDF,       644.23 KB
  )

 


For a downloadable copy of IOCs (35kb), see:






   

    AA23-136A.STIX_.xml
    (XML,       34.72 KB
  )

 


For a downloadable copy of IOCs in JSON format, see AA23-136A.stix.json


Technical Details


Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 13. See the MITRE ATT&CK® Tactics and Techniques section for a table of the threat actors' activity mapped to MITRE ATT&CK® Tactics and Techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK's Best Practices for MITRE ATT&CK Mapping and CISA's Decider Tool.


BianLian is a ransomware developer, deployer, and data extortion cybercriminal group. FBI observed BianLian group targeting organizations in multiple U.S. critical infrastructure sectors since June 2022. In Australia, ACSC has observed BianLian group predominately targeting private enterprises, including one critical infrastructure organization. BianLian group originally employed a double-extortion model in which they exfiltrated financial, client, business, technical, and personal files for leverage and encrypted victims' systems. In 2023, FBI observed BianLian shift to primarily exfiltration-based extortion with victims' systems left intact, and ACSC observed BianLian shift exclusively to exfiltration-based extortion. BianLian actors warn of financial, business, and legal ramifications if payment is not made.


Initial Access


BianLian group actors gain initial access to networks by leveraging compromised Remote Desktop Protocol (RDP) credentials likely acquired from initial access brokers [T1078],[T1133] or via phishing [T1566].


Command and Control


BianLian group actors implant a custom backdoor specific to each victim written in Go (see the Indicators of Compromise Section for an example) [T1587.001] and install remote management and access software—e.g., TeamViewer, Atera Agent, SplashTop, AnyDesk—for persistence and command and control [T1105],[T1219].


FBI also observed BianLian group actors create and/or activate local administrator accounts [T1136.001] and change those account passwords [T1098].


Defense Evasion


BianLian group actors use PowerShell [T1059.001] and Windows Command Shell [T1059.003] to disable antivirus tools [T1562.001], specifically Windows defender and Anti-Malware Scan Interface (AMSI). BianLian actors modify the Windows Registry [T1112] to disable tamper protection for Sophos SAVEnabled, SEDEenabled, and SAVService services, which enables them to uninstall these services. See Appendix: Windows PowerShell and Command Shell Activity for additional information, including specific commands they have used.


Discovery


BianLian group actors use a combination of compiled tools, which they first download to the victim environment, to learn about the victim's environment. BianLian group actors have used:


BianLian actors also use native Windows tools and Windows Command Shell to:


See Appendix: Windows PowerShell and Command Shell Activity for additional information, including specific commands they have used.


Credential Access


BianLian group uses valid accounts for lateral movement through the network and to pursue other follow-on activity. To obtain the credentials, BianLian group actors use Windows Command Shell to find unsecured credentials on the local machine [T1552.001]. FBI also observed BianLian harvest credentials from the Local Security Authority Subsystem Service (LSASS) memory [T1003.001], download RDP Recognizer (a tool that could be used to brute force RDP passwords or check for RDP vulnerabilities) to the victim system, and attempt to access an Active Directory domain database (NTDS.dit) [T1003.003].


In one case, FBI observed BianLian actors use a portable executable version of an Impacket tool (secretsdump.py) to move laterally to a domain controller and harvest credential hashes from it. Note: Impacket is a Python toolkit for programmatically constructing and manipulating network protocols. Through the Command Shell, an Impacket user with credentials can run commands on a remote device using the Windows management protocols required to support an enterprise network. Threat actors can run portable executable files on victim systems using local user rights, assuming the executable is not blocked by an application allowlist or antivirus solution.


See Appendix: Windows PowerShell and Command Shell Activity for additional information.


Persistence and Lateral Movement


BianLian group actors use PsExec and RDP with valid accounts for lateral movement [T1021.001]. Prior to using RDP, BianLian actors used Command Shell and native Windows tools to add user accounts to the local Remote Desktop Users group, modified the added account's password, and modified Windows firewall rules to allow incoming RDP traffic [T1562.004]. See Appendix: Windows PowerShell and Command Shell Activity for additional information.


In one case, FBI found a forensic artifact (exp.exe) on a compromised system that likely exploits the Netlogon vulnerability (CVE-2020-1472) and connects to a domain controller.


Collection


FBI observed BianLian group actors using malware (system.exe) that enumerates registry [T1012] and files [T1083] and copies clipboard data from users [T1115].


Exfiltration and Impact


BianLian group actors search for sensitive files using PowerShell scripts (See Appendix: Windows PowerShell and Command Shell Activity) and exfiltrate them for data extortion. Prior to January 2023, BianLian actors encrypted files [T1486] after exfiltration for double extortion.


BianLian group uses File Transfer Protocol (FTP) [T1048] and Rclone, a tool used to sync files to cloud storage, to exfiltrate data [T1537]. FBI observed BianLian group actors install Rclone and other files in generic and typically unchecked folders such as programdata\vmware and music folders. ACSC observed BianLian group actors use Mega file-sharing service to exfiltrate victim data [T1567.002].


BianLian's encryptor (encryptor.exe) modified all encrypted files to have the .bianlian extension. The encryptor created a ransom note, Look at this instruction.txt, in each affected directory (see Figure 1 for an example ransom note.) According to the ransom note, BianLian group specifically looked for, encrypted, and exfiltrated financial, client, business, technical, and personal files.







    Screenshot of sample text

     
Figure 1: BianLian Sample Ransom Note (Look at this instruction.txt)

If a victim refuses to pay the ransom demand, BianLian group threatens to publish exfiltrated data to a leak site maintained on the Tor network. The ransom note provides the Tox ID A4B3B0845DA242A64BF17E0DB4278EDF85855739667D3E2AE8B89D5439015F07E81D12D767FC, which does not vary across victims. The Tox ID directs the victim organization to a Tox chat via https://qtox.github[.]io and includes an alternative contact email address (swikipedia@onionmail[.]org or xxx@mail2tor[.]com). The email address is also the same address listed on the group's Tor site under the contact information section. Each victim company is assigned a unique identifier included in the ransom note. BianLian group receives payments in unique cryptocurrency wallets for each victim company.


BianLian group engages in additional techniques to pressure the victim into paying the ransom; for example, printing the ransom note to printers on the compromised network. Employees of victim companies also reported receiving threatening telephone calls from individuals associated with BianLian group.


Indicators of Compromise (IOC)


See Table 1 for IOCs obtained from FBI investigations as of March 2023.


















Table 1: BianLian Ransomware and Data Extortion Group IOCs

Name



SHA-256 Hash



Description



def.exe



7b15f570a23a5c5ce8ff942da60834a9d0549ea3ea9f34f900a09331325df893



Malware associated with BianLian intrusions, which is an example of a possible backdoor developed by BianLian group.



encryptor.exe



1fd07b8d1728e416f897bef4f1471126f9b18ef108eb952f4b75050da22e8e43



Example of a BianLian encryptor.



exp.exe



0c1eb11de3a533689267ba075e49d93d55308525c04d6aff0d2c54d1f52f5500



Possible NetLogon vulnerability (CVE-2020-1472) exploitation.



system.exe



40126ae71b857dd22db39611c25d3d5dd0e60316b72830e930fba9baf23973ce



Enumerates registry and files. Reads clipboard data.


MITRE ATT&CK Techniques


See Table 2 for all referenced threat actor tactics and techniques in this advisory.


















































































































Table 2: BianLian Group Actors ATT&CK Techniques for Enterprise

Technique Title



ID



Use



Resource Development


Develop Capabilities: Malware



T1587.001



BianLian group actors developed a custom backdoor used in their intrusions.



Initial Access


External Remote Services



T1133



BianLian group actors used RDP with valid accounts as a means of gaining initial access and for lateral movement.



Phishing



T1566



BianLian group actors used phishing to obtain valid user credentials for initial access.



Valid Accounts



T1078



BianLian group actors used RDP with valid accounts as a means of gaining initial access and for lateral movement.



Execution


Command and Scripting Interpreter: PowerShell



T1059.001



BianLian group actors used PowerShell to disable AMSI on Windows. See Appendix: Windows PowerShell and Command Shell Activity for additional information.



Command and Scripting Interpreter: Windows Command Shell



T1059.003



BianLian group actors used Windows Command Shell to disable antivirus tools, for discovery, and to execute their tools on victim networks. See Appendix: Windows PowerShell and Command Shell Activity for additional information.



Scheduled Task/Job: Scheduled Task



T1053.005



BianLian group actors used a Scheduled Task run as SYSTEM (the highest privilege Windows accounts) to execute a Dynamic Link Library (DLL) file daily. See Appendix: Windows PowerShell and Command Shell Activity for additional information.



Persistence


Account Manipulation



T1098



BianLian group actors changed the password of an account they created.


BianLian actors modified the password of an account they added to the local Remote Desktop Users group.



Create Account: Local Account



T1136.001



BianLian group actors created/activated a local administrator account.


BianLian group actors used net.exe to add a user account to the local Remote Desktop Users group. (See Appendix: Windows PowerShell and Command Shell Activity for more information.)



Defense Evasion


Modify Registry



T1112



BianLian group actors modified the registry to  disable user authentication for RDP connections, allow a user to receive help from Remote Assistance, and disable tamper protection for Sophos SAVEnabled, SEDEenabled, and SAVService services, which enables them to uninstall these services.



Impair Defenses: Disable or Modify Tools



T1562.001



BianLian group actors disabled Windows defender, AMSI, and Sophos SAVEnabled and SEDEenabled tamper protection services. See Appendix: Windows PowerShell and Command Shell Activity for additional information.



Impair Defenses: Disable or Modify System Firewall



T1562.004



BianLian group actors added modified firewalls to allow RDP traffic by adding new rules to the Windows firewall that allow incoming RDP traffic and enable a pre-existing Windows firewall rule group named Remote Desktop.



Credential Access


OS Credential Dumping: LSASS Memory



T1003.001



BianLian group actors accessed credential material stored in the process memory of the LSASS. See Appendix: Windows PowerShell and Command Shell Activity for additional information.



OS Credential Dumping: NTDS



T1003.003



BianLian group actors attempted to access or create a copy of the Active Directory domain database in order to steal credential information and to obtain other information about domain members such as devices, users, and access rights.



Unsecured Credentials: Credentials In Files



T1552.001



BianLian group actors searched local file systems and remote file shares for files containing insecurely stored credentials.



Discovery


Account Discovery: Domain Account



1087.002



BianLian group actors queried the domain controller to identify accounts in the Domain Admins and Domain Computers groups. This information can help adversaries determine which domain accounts exist to aid in follow-on activity.



Domain Trust Discovery



T1482



BianLian group actors used PingCastle to enumerate the AD and map trust relationships.


BianLian group actors retrieved a list of domain trust relationships used to identify lateral movement opportunities in Windows multi-domain/forest environments.



File and Directory Discovery



T1083



BianLian group used malware (system.exe) that enumerates files.



Network Service Discovery



T1046



BianLian actors used Advanced Port Scanner and SoftPerfect Network Scanner to ping computers, scan ports, and identify program versions running on ports.



Network Share Discovery



T1135



BianLian actors used SoftPerfect Network Scanner, which can discover shared folders.


BianLian group actors used SharpShares to enumerate accessible network shares in a domain.



Permission Groups Discovery: Domain Groups



T1069.002



BianLian group actors queried the domain controller to identify groups.



Query Registry



T1012



BianLian group used malware (system.exe) that enumerates registry.



Remote System Discovery



T1018



BianLian group actors attempted to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for lateral movement.


BianLian group actors retrieved a list of domain controllers.



System Owner User Discovery



T1033



BianLian group actors queried currently logged-in users on a machine.



Lateral Movement


Remote Services: Remote Desktop Protocol



T1021.001



BianLian group actors used RDP with valid accounts for lateral movement.



Collection


Clipboard Data



T1115



BianLian group actors' malware collects data stored in the clipboard from users copying information within or between applications.



Command and Control


Ingress Tool Transfer



T1105



BianLian group actors transferred tools or other files from an external system into a compromised environment.



Remote Access Software



T1219



BianLian group actors used legitimate desktop support and remote access software, such as TeamViewer, Atera, and SplashTop, to establish an interactive command and control channel to target systems within networks.



Exfiltration


Transfer Data to Cloud Account



T1537



BianLian group actors used Rclone to exfiltrate data to a cloud account they control on the same service to avoid typical file transfers/downloads and network-based exfiltration detection.



Exfiltration Over Alternative Protocol



T1048



BianLian group actors exfiltrated data via FTP.



Exfiltration Over Web Service: Exfiltration to Cloud Storage



T1567.002



BianLian group actors exfiltrated data via Mega public file-sharing service.



Impact


Data Encrypted for Impact



T1486



BianLian group actors encrypted data on target systems.


Mitigations


FBI, CISA, and ACSC recommend organizations implement the mitigations below to improve your organization's cybersecurity posture on the basis of the threat actors' activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA's Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.


See NSA Cybersecurity Information sheet Enforce Signed Software Execution Policies for additional guidance.


In addition, FBI, CISA, and ACSC recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors:


Validate Security Controls


In addition to applying mitigations, FBI, CISA, and ACSC recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. FBI, CISA, and ACSC recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.


To get started:


  1. Select an ATT&CK technique described in this advisory (see Table 2).

  2. Align your security technologies against the technique.

  3. Test your technologies against the technique.

  4. Analyze your detection and prevention technologies' performance.

  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.

  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

FBI, CISA, and ACSC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.


RESOURCES


Reporting


The FBI is seeking any information that can be shared, including boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with BianLian actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. The FBI and CISA do not encourage paying ransom, as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office or CISA at cisa.gov/report. Australian organizations that have been impacted or require assistance in regard to a ransomware incident can contact ACSC via 1300 CYBER1 (1300 292 371) or by submitting a report cyber.gov.au.


Acknowledgements


Microsoft and Sophos contributed to this advisory.


APPENDIX: WINDOWS PowerSHell and COMMAND SHELL ACTIVITY


Through FBI investigations as of March 2023, FBI has observed BianLian actors use the commands in Table 3. ACSC has observed BianLian actors use some of the same commands.







































































Table 3: PowerShell and Windows Command Shell Activity

Command



Use



[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,* Static').SetValue($null,$true) 



Disables the AMSI on Windows. AMSI is a built-in feature on Windows 10 and newer that provides an interface for anti-malware scanners to inspect scripts prior to execution. When AMSI is disabled, malicious scripts may bypass antivirus solutions and execute undetected.



cmd.exe /Q /c for /f "tokens=1,2 delims= " ^%A in ('"tasklist /fi "Imagename eq lsass.exe" | find "lsass""') do rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump ^%B \Windows\Temp\.csv full



Creates a memory dump lsass.exe process and saves it as a CSV filehttps://attack.mitre.org/versions/v12/techniques/T1003/001/.  BianLian actors used it to harvest credentials from lsass.exe.



cmd.exe /Q /c net user /active:yes 1> \\127.0.0.1\C$\Windows\Temp\ 2>&1



Activates the local Administrator account.



cmd.exe /Q /c net user "" 1> \\127.0.0.1\C$\Windows\Temp\ 2>&1



Changes the password of the newly activated local Administrator account.



cmd.exe /Q /c quser 1> \\127.0.0.1\C$\Windows\Temp\ 2>&1



Executes quser.exe to query the currently logged-in users on a machine. The command is provided arguments to run quietly and exit upon completion, and the output is directed to the \Windows\Temp directory.



dism.exe /online /Disable-Feature /FeatureName:Windows-Defender /Remove /NoRestart



Using the Deployment Image Servicing and Management (DISM) executable file, removes the Windows Defender feature.



dump.exe -no-pass -just-dc user.local/\@



Executes secretsdump.py, a Portable Executable version of an Impacket tool. Used to dump password hashes from domain controllers.



exp.exe -n -t



Possibly attempted exploitation of the NetLogon vulnerability (CVE-2020-1472).



findstr /spin "password" *.* >C:\Users\training\Music\.txt



Searches for the string password in all files in the current directory and its subdirectories and puts the output to a file.



ldap.exe -u user\ -p ldap://



Connects to the organization's Lightweight Directory Access Protocol (LDAP) server.



logoff



Logs off the current user from a Windows session. Can be used to log off multiple users at once.



mstsc



Launches Microsoft Remote Desktop Connection client application in Windows.



net group /domain



Retrieves a list of all groups from the domain controller.



net group 'Domain Admins' /domain



Queries the domain controller to retrieve a list of all accounts from Domain Admins group.



net group 'Domain Computers' /domain



Queries the domain controller to retrieve a list of all accounts from Domain Computers group.



net user /domain



Queries the domain controller to retrieve a list of all users in the domain.



net.exe localgroup "Remote Desktop Users" /add



Adds a user account to the local Remote Desktop Users group.



net.exe user /domain



Modifies the password for the specified account.



netsh.exe advfirewall firewall add rule "name=allow RemoteDesktop" dir=in * protocol=TCP localport= action=allow



Adds a new rule to the Windows firewall that allows incoming RDP traffic.



netsh.exe advfirewall firewall set rule "group=remote desktop" new enable=Yes



Enables the pre-existing Windows firewall rule group named Remote Desktop. This rule group allows incoming RDP traffic.



nltest /dclist



Retrieves a list of domain controllers.



nltest /domain_trusts



Retrieves a list of domain trusts.



ping.exe -4 -n 1 *



Sends a single ICMP echo request packet to all devices on the local network using the IPv4 protocol. The output of the command will show if the device is reachable or not.



quser; ([adsisearcher]"(ObjectClass=computer)").FindAll().count;([adsisearcher]"(ObjectClass=user)").FindAll().count;[Security.Principal.WindowsIdentity]::GetCurrent() | select name;net user "$env:USERNAME" /domain; (Get-WmiObject -class Win32_OperatingSystem).Caption; Get-WmiObject -Namespace root\cimv2 -Class Win32_ComputerSystem; net group "domain admins" /domain; nltest /dclist:; nltest /DOMAIN_TRUSTS



Lists the current Windows identity for the logged-in user and displays the user's name. Uses the Active Directory Services Interface (ADSI) to search for all computer and user objects in the domain and returns counts of the quantities found. Lists information about the current user account from the domain, such as the user's name, description, and group memberships. Lists information about the operating system installed on the local computer. Lists information about the "Domain Admins" group from the domain. Lists all domain controllers in the domain. Displays information about domain trusts.



reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal * Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 0 /f



Adds/overwrites a new Registry value to disable user authentication for RDP connections.



reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /* v fAllowToGetHelp /t REG_DWORD /d 1 /f



Adds/overwrites a new Registry value to allow a user to receive help from Remote Assistance.



reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sophos Endpoint * Defense\TamperProtection\Config" /t REG_DWORD /v SAVEnabled /d 0 /f



Adds/overwrites a new Registry value to disable tamper protection for Sophos antivirus named SAVEnabled.



reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sophos Endpoint * Defense\TamperProtection\Config" /t REG_DWORD /v SEDEnabled /d 0 /f



Adds/overwrites a new Registry value to disable tamper protection for Sophos antivirus named SEDEnabled.



reg.exe ADD * HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Sophos\SAVService\TamperProtection /t REG_DWORD /v Enabled /d 0 /f



Adds/overwrites a new registry value to disable tamper protection for a Sophos antivirus service called SAVService.



reg.exe copy hklm\system\CurrentControlSet\services\tvnserver * hklm\system\CurrentControlSet\control\safeboot\network\tvnserver /s /f



Copies the configuration settings for the tvnserver service to a new location in the registry that will be used when the computer boots into Safe Mode with Networking. This allows the service to run with the same settings in Safe Mode as it does in normal mode.



s.exe /threads:50 /ldap:all /verbose /outfile:c:\users\\desktop\1.txt



Executes SharpShares.



schtasks.exe /RU SYSTEM /create /sc ONCE / /tr "cmd.exe /crundll32.exe c:\programdata\netsh.dll,Entry" /ST 04:43



Creates a Scheduled Task run as SYSTEM at 0443 AM. When the task is run, cmd.exe uses crundll32.exe to run the DLL file netsh.dll. (It is likely that netsh.dll is a malware file and not associated with netsh.)



start-process PowerShell.exe -arg C:\Users\Public\Music\.ps1 -WindowStyle Hidden



Executes a PowerShell script, while keeping the PowerShell window hidden from the user.


Disclaimer


The information in this report is being provided "as is" for informational purposes only. FBI, CISA, and ACSC do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, or ACSC.


 


Source: #StopRansomware: BianLian Ransomware Group (https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-136a)