Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
Actions to take today to mitigate cyber threats from CL0P ransomware:
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known CL0P ransomware IOCs and TTPs identified through FBI investigations as recently as June 2023.
According to open source information, beginning on May 27, 2023, CL0P Ransomware Gang, also known as TA505, began exploiting a previously unknown SQL injection vulnerability (CVE-2023-34362) in Progress Software's managed file transfer (MFT) solution known as MOVEit Transfer. Internet-facing MOVEit Transfer web applications were infected with a web shell named LEMURLOOT, which was then used to steal data from underlying MOVEit Transfer databases. In similar spates of activity, TA505 conducted zero-day-exploit-driven campaigns against Accellion File Transfer Appliance (FTA) devices in 2020 and 2021, and Fortra/Linoma GoAnywhere MFT servers in early 2023.
FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of CL0P ransomware and other ransomware incidents.
Download the PDF version or the STIX file of this report:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 13. See MITRE ATT&CK for Enterprise for all referenced tactics and techniques.
Appearing in February 2019, and evolving from the CryptoMix ransomware variant, CL0P was leveraged as a Ransomware as a Service (RaaS) in large-scale spear-phishing campaigns that used a verified and digitally signed binary to bypass system defenses. CL0P was previously known for its use of the "double extortion" tactic of stealing and encrypting victim data, refusing to restore victim access and publishing exfiltrated data on Tor via the CL0P^_-LEAKS website. In 2019, TA505 actors leveraged CL0P ransomware as the final payload of a phishing campaign involving a macro-enabled document that used a Get2 malware dropper for downloading SDBot and FlawedGrace. In recent campaigns beginning 2021, CL0P preferred to rely mostly on data exfiltration over encryption.
Beyond CL0P ransomware, TA505 is known for frequently changing malware and driving global trends in criminal malware distribution. Considered to be one of the largest phishing and malspam distributors worldwide, TA505 is estimated to have compromised more than 3,000 U.S.-based organizations and 8,000 global organizations.
TA505 has operated:
In a campaign from 2020 to 2021, TA505 used several zero-day exploits to install a web shell named DEWMODE on internet-facing Accellion FTA servers. Similarly, the recent exploitation of MOVEit Transfer, a SQL injection vulnerability was used to install the web shell, which enabled TA505 to execute operating system commands on the infected server and steal data.
In late January 2023, the CL0P ransomware group launched a campaign using a zero-day vulnerability, now catalogued as CVE-2023-0669, to target the GoAnywhere MFT platform. The group claimed to have exfiltrated data from the GoAnywhere MFT platform that impacted approximately 130 victims over the course of 10 days. Lateral movement into the victim networks from the GoAnywhere MFT was not identified, suggesting the breach was limited to the GoAnywhere platform itself. Over the next several weeks, as the exfiltrated data was parsed by the group, ransom notes were sent to upper-level executives of the victim companies, likely identified through open source research. The ransom notes threatened to publish the stolen files on the CL0P data leak site if victims did not pay the ransom amount.
Hello, this is the CL0P hacker group. As you may know, we recently carried out a hack, which was reported in the news on site [redacted]. We want to inform you that we have stolen important information from your GoAnywhere MFT resource and have attached a full list of files as evidence. We deliberately did not disclose your organization and wanted to negotiate with you and your leadership first. If you ignore us, we will sell your information on the black market and publish it on our blog, which receives 30-50 thousand unique visitors per day. You can read about us on [redacted] by searching for CLOP hacker group. You can contact us using the following contact information: unlock@rsv-box[.]com and unlock@support-mult[.]com |
CL0P's toolkit contains several malware types to collect information, including the following:
MOVEit is typically used to manage an organization's file transfer operations and has a web application that supports MySQL, Microsoft SQL Server, and Azure SQL database engines. In May 2023, the CL0P ransomware group exploited a SQL injection zero-day vulnerability CVE-2023-34362 to install a web shell named LEMURLOOT on MOVEit Transfer web applications [T1190] [1]. The web shell was initially observed with the name human2.aspx in an effort to masquerade as the legitimate human.aspx file present as part of MOVEit Transfer software. Upon installation, the web shell creates a random 36 character password to be used for authentication. The web shell interacts with its operators by awaiting HTTP requests containing a header field named X-siLock-Comment, which must have a value assigned equal to the password established upon the installation of the web shell. After authenticating with the web shell, operators pass commands to the web shell that can:
Progress Software announced the discovery of CVE-2023-34362 MOVEit Transfer vulnerability and issued guidance on known affected versions, software upgrades, and patching. Based on evidence of active exploitation, CISA added this vulnerability to the Known Exploited Vulnerabilities (KEVs) Catalog on June 2, 2023. This MOVEit Transfer critical vulnerability exploit impacts the following versions of the software [2]:
Due to the speed and ease TA505 has exploited this vulnerability, and based on their past campaigns, FBI and CISA expect to see widespread exploitation of unpatched software services in both private and public networks. For IOCs related to the MOVEit campaign, see table 2.
Below, are open source deployable YARA rules that may be used to detect malicious activity of the MOVEit Transfer Zero Day Vulnerability. For more information, visit GitHub or the resource section of this CSA. [1] [3]:
rule M_Webshell_LEMURLOOT_DLL_1 { |
rule M_Webshell_LEMURLOOT_1 { |
If a victim rebuilds the web server but leaves the database intact, the CL0P user accounts will still exist and can be used for persistent access to the system.
Victims can use the following SQL query to audit for active administrative accounts, and should validate that only intended accounts are present.
SELECT * FROM [
|
Files | Hash | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
LEMURLOOT Web Shell e.g. human2.aspx |
|
Files | Hash | Description |
---|---|---|
larabqFa.exe | 0e3a14638456f4451fe8d76fdc04e591fba942c2f16da31857ca66293a58a4c3 | Truebot |
%TMP%\7ZipSfx.000\Zoom.exe | 1285aa7e6ee729be808c46c069e30a9ee9ce34287151076ba81a0bea0508ff7e | Spawns a PowerShell subprocess which executes a malicious DLL file |
%TMP%\7ZipSfx.000\ANetDiag.dll | 2c8d58f439c708c28ac4ad4a0e9f93046cf076fc6e5ab1088e8943c0909acbc4 | Obfuscated malware which also uses long sleeps and debug detection to evade analysis |
AVICaptures.dll | a8569c78af187d603eecdc5faec860458919349eef51091893b705f466340ecd | Truebot |
kpdphhajHbFerUr.exe | c042ad2947caf4449295a51f9d640d722b5a6ec6957523ebf68cddb87ef3545c | Truebot |
dnSjujahur.exe | c9b874d54c18e895face055eeb6faa2da7965a336d70303d0bd6047bec27a29d | Truebot |
7ZSfxMod_x86.exe | d5bbcaa0c3eeea17f12a5cc3dbcaffff423d00562acb694561841bcfe984a3b7 | Fake Zoom installer - Truebot |
update.jsp | eb9f5cbe71f9658d38fb4a7aa101ad40534c4c93ee73ef5f6886d89159b0e2c2 | Java Server Pages (JSP) web shell with some base64 obfuscation |
%TMP%\ | f2f08e4f108aaffaadc3d11bad24abdd625a77e0ee9674c4541b562c78415765 | Employs sandbox detection and string obfuscation - appears to be a collection of C# hack tools |
UhfdkUSwkFKedUUi.exe | ff8c8c8bfba5f2ba2f8003255949678df209dbff95e16f2f3c338cfa0fd1b885 | Truebot |
Email Address | Description |
---|---|
unlock@rsv-box[.]com | CL0P communication email |
unlock@support-mult[.]com | CL0P communication email |
rey14000707@gmail[.]com | Login/Download |
gagnondani225@gmail[.]com |
Malicious Domain |
---|
http://hiperfdhaus[.]com |
http://jirostrogud[.]com |
http://qweastradoc[.]com |
http://qweastradoc[.]com/gate.php |
http://connectzoomdownload[.]com/download/ZoomInstaller.exe |
https://connectzoomdownload[.]com/download/ZoomInstaller.exe |
http://zoom[.]voyage/download/Zoom.exe |
http://guerdofest[.]com/gate.php |
Certificate Name | Status | Date Valid | Thumbprint | Serial Number |
---|---|---|---|---|
Savas Investments PTY LTD | Valid Issuer: Sectigo Public Code Signing CA R36 | 10/7/2022 - 10/7/2023 | 8DCCF6AD21A58226521 E36D7E5DBAD133331C181 | 00-82-D2-24-32-3E-FA-65-06-0B-64- 1F-51-FA-DF-EF-02 |
MOVEit Campaign Infrastructure IP Addresses May/June 2023 | GoAnywhere Campaign Infrastructure IP Addresses January/February 2023 |
---|---|
104.194.222[.]107 | 100.21.161[.]34 |
138.197.152[.]201 | 104.200.72[.]149 |
146.0.77[.]141 | 107.181.161[.]207 |
146.0.77[.]155 | 141.101.68[.]154 |
146.0.77[.]183 | 141.101.68[.]166 |
148.113.152[.]144 | 142.44.212[.]178 |
162.244.34[.]26 | 143.31.133[.]99 |
162.244.35[.]6 | 148.113.159[.]146 |
179.60.150[.]143 | 148.113.159[.]213 |
185.104.194[.]156 | 15.235.13[.]184 |
185.104.194[.]24 | 15.235.83[.]73 |
185.104.194[.]40 | 162.158.129[.]79 |
185.117.88[.]17 | 166.70.47[.]90 |
185.162.128[.]75 | 172.71.134[.]76 |
185.174.100[.]215 | 173.254.236[.]131 |
185.174.100[.]250 | 185.104.194[.]134 |
185.181.229[.]240 | 185.117.88[.]2 |
185.181.229[.]73 | 185.174.100[.]17 |
185.183.32[.]122 | 185.33.86[.]225 |
185.185.50[.]172 | 185.33.87[.]126 |
188.241.58[.]244 | 185.80.52[.]230 |
193.169.245[.]79 | 185.81.113[.]156 |
194.33.40[.]103 | 192.42.116[.]191 |
194.33.40[.]104 | 195.38.8[.]241 |
194.33.40[.1]64 | 198.137.247[.]10 |
198.12.76[.]214 | 198.199.74[.]207 |
198.27.75[.]110 | 198.199.74[.]207:1234/update.jsp |
206.221.182[.]106 | 198.245.13[.]4 |
209.127.116[.]122 | 20.47.120[.]195 |
209.127.4[.]22 | 208.115.199[.]25 |
209.222.103[.]170 | 209.222.98[.]25 |
209.97.137[.]33 | 213.121.182[.]84 |
45.227.253[.]133 | 216.144.248[.]20 |
45.227.253[.]147 | 23.237.114[.]154 |
45.227.253[.]50 | 23.237.56[.]234 |
45.227.253[.]6 | 3.101.53[.]11 |
45.227.253[.]82 | 44.206.3[.]111 |
45.56.165[.]248 | 45.182.189[.]200 |
5.149.248[.]68 | 45.182.189[.]228 |
5.149.250[.]74 | 45.182.189[.]229 |
5.149.250[.]92 | 5.149.250[.]90 |
5.188.86[.]114 | 5.149.252[.]51 |
5.188.86[.]250 | 5.188.206[.]76 |
5.188.87[.]194 | 5.188.206.76[:]8000/se1.dll |
5.188.87[.]226 | 5.34.178[.]27 |
5.188.87[.]27 | 5.34.178[.]28 |
5.252.23[.]116 | 5.34.178[.]30 |
5.252.25[.]88 | 5.34.178[.]31 |
5.34.180[.]205 | 5.34.180[.]48 |
62.112.11[.]57 | 50.7.118[.]90 |
62.182.82[.]19 | 54.184.187[.]134 |
62.182.85[.]234 | 54.39.133[.]41 |
66.85.26[.]215 | 63.143.42[.]242 |
66.85.26[.]234 | 68.156.159[.]10 |
66.85.26[.]248 | 74.218.67[.]242 |
79.141.160[.]78 | 76.117.196[.]3 |
79.141.160[.]83 | 79.141.160[.]78 |
84.234.96[.]104 | 79.141.161[.]82 |
84.234.96[.]31 | 79.141.173[.]94 |
89.39.104[.]118 | 81.56.49[.]148 |
89.39.105[.]108 | 82.117.252[.]141 |
91.202.4[.]76 | 82.117.252[.]142 |
91.222.174[.]95 | 82.117.252[.]97 |
91.229.76[.]187 | 88.214.27[.]100 |
93.190.142[.]131 | 88.214.27[.]101 |
| 91.222.174[.]68 |
| 91.223.227[.]140 |
| 92.118.36[.]210 |
| 92.118.36[.]213 |
| 92.118.36[.]249 |
| 96.10.22[.]178 |
| 96.44.181[.]131 |
| 5.252.23[.]116 |
| 5.252.25[.]88 |
| 84.234.96[.]104 |
| 89.39.105[.]108 |
| 138.197.152[.]201 |
| 148.113.152[.]144 |
| 198.12.76[.]214 |
| 209.97.137[.]33 |
| 209.222.103[.]170 |
See tables below for referenced CL0P tactics and techniques used in this advisory.
Initial Access | ||
---|---|---|
Technique Title | ID | Use |
Exploit Public-Facing Application | CL0P ransomware group exploited the zero-day vulnerability CVE-2023-34362 affecting MOVEit Transfer software; begins with a SQL injection to infiltrate the MOVEit Transfer web application. | |
Phishing | CL0P actors send a large volume of spear-phishing emails to employees of an organization to gain initial access. |
Execution | ||
---|---|---|
Technique Title | ID | Use |
Command and Scripting Interpreter: PowerShell | CL0P actors use SDBot as a backdoor to enable other commands and functions to be executed in the compromised computer. | |
Command and Scripting Interpreter | CL0P actors use TinyMet, a small open-source Meterpreter stager to establish a reverse shell to their C2 server. | |
Shared Modules | CL0P actors use Truebot to download additional modules. |
Persistence | ||
---|---|---|
Technique Title | ID | Use |
Server Software Component: Web Shell | DEWMODE is a web shell designed to interact with a MySQL database, and is used to exfiltrate data from the compromised network. | |
Event Triggered Execution: Application Shimming | CL0P actors use SDBot malware for application shimming for persistence and to avoid detection. |
Privilege Escalation | ||
---|---|---|
Technique Title | ID | Use |
Exploitation for Privilege Escalation | CL0P actors were gaining access to MOVEit Transfer databases prior to escalating privileges within compromised network. |
Defense Evasion | ||
---|---|---|
Technique Title | ID | Use |
Process Injection | CL0P actors use Truebot to load shell code. | |
Indicator Removal | CL0P actors delete traces of Truebot malware after it is used. | |
Hijack Execution Flow: DLL Side-Loading | CL0P actors use Truebot to side load DLLs. |
Discovery | ||
---|---|---|
Technique Title | ID | Use |
Remote System Discovery | CL0P actors use Cobalt Strike to expand network access after gaining access to the Active Directory (AD) servers. |
Lateral Movement | ||
---|---|---|
Technique Title | ID | Use |
Remote Services: SMB/Windows Admin Shares | CL0P actors have been observed attempting to compromise the AD server using Server Message Block (SMB) vulnerabilities with follow-on Cobalt Strike activity. | |
Remote Service Session Hijacking: RDP Hijacking | CL0P ransomware actors have been observed using Remote Desktop Protocol (RDP) to interact with compromised systems after initial access. |
Collection | ||
---|---|---|
Technique Title | ID | Use |
Screen Capture | CL0P actors use Truebot to take screenshots in effort to collect sensitive data. |
Command and Control | ||
---|---|---|
Technique Title | ID | Use |
Application Layer Protocol | CL0P actors use FlawedAmmyy remote access trojan (RAT) to communicate with the Command and Control (C2). | |
Ingress Tool Transfer | CL0P actors are assessed to use FlawedAmmyy remote access trojan (RAT) to the download of additional malware components. CL0P actors use SDBot to drop copies of itself in removable drives and network shares. |
Exfiltration | ||
---|---|---|
Technique Title | ID | Use |
Exfiltration Over C2 Channel | CL0P actors exfiltrate data for C2 channels. |
The authoring agencies recommend organizations implement the mitigations below to improve their organization's security posture in response to threat actors' activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA's Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections to reduce the risk of compromise by CL0P ransomware.
In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors: