BianLian Ransomware Expanding C2 Infrastructure and Operational Tempo

The threat actors behind the BianLian Ransomware are rapidly expanding infrastructure, and it has been observed targeting manufacturing organizations.
BianLian Ransomware

The threat actors behind the BianLian Ransomware are rapidly expanding infrastructure, and it has been observed targeting manufacturing organizations.

Context

On September 1, 2022, researchers at the cybersecurity firm Redacted published a technical analysis of the BianLian ransomware. In the past month, BianLian has been observed being deployed against numerous sectors, including manufacturing, healthcare, and education. Throughout August, Redacted researchers reported observing BianLian threat actors rapidly expanding their command and control (C2) infrastructure and increasing their attack rate.

Technical Analysis

BianLian is written in the Go programming language, likely to frustrate reverse engineering efforts by security researchers and to make compromising multiple platforms easier for the threat actors deploying the ransomware.

According to Redacted researchers, the threat actor appears technically sophisticated in compromising targeted networks, but is likely inexperienced at ransomware operations, based on the following behaviors observed during the investigation:

  • Mistakenly sending data from one victim to another.
  • Possessing a relatively stable backdoor toolkit but have an actively developing encryption tool with an evolving ransom note.
  • Long delays in communications with victims.
  • Through the group’s own admission on their onion site, the business side of their infrastructure is unreliable.

Redacted researchers also noted that the BianLian threat actors targeted the ProxyShell vulnerability chain (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) and SonicWall VPN devices to gain initial access into victim networks. The threat actors also employ Living off the Land (LOL) methodology to move laterally, adjusting operations based on defensive controls present on infected networks.

Mitigation Options

Researchers with Redacted provided the following defensive measures:

  • An aggressive, prioritized patching regime.
  • Employ multi-factor authentication on every system that allows that as an option.
  • Visibility into your network and endpoint devices to quickly identify breaches.
  • Secure backups to allow return to business operations as soon as possible.
  • A well-practiced incident response plan, so everyone involved knows their role.
  • An assessment of your “Crown Jewels” that can be used to both inform your security posture and decide ahead of an incident what data you could afford to have leaked so you can avoid paying the ransom.

In addition to these strategic recommendations, there are multiple opportunities for behavioral detections in the attack chain leveraged by BianLian:

  • Defense Evasion: Svchost not a child of services.exe
    • BianLian called one of their LOL tools svchost, then launched it via a process other than services.exe.
  • Defense Evasion: Svchost executing from an unusual path
    • BianLian called one of their LOL tools svchost.exe, then executed it from a non-standard path.
  • Defense Evasion: Netsh to modify firewall rules
    • BianLian leveraged netsh to add a firewall rule to open 3389 to Remote Desktop.
  • Reconnaissance: Ping -4 -n 1
    • BianLian used single pings to perform network reconnaissance. This is a false-positive prone alert.
  • Lateral Movement: Winrm dropping a file via PowerShell
    • The binary wsmprovhost.exe is used to mediate the relationship between WinRM and PowerShell. Alerting on file modification by wsmprovhost.exe proved a reliable method to detect BianLian dropping malicious files.
  • Lateral Movement: Unknown Binary Established Connection on 3389
    • If leveraging an EDR that classifies binaries as known and unknown and ties network connections to binaries, looking for 3389 in use by unknown binaries can be extremely fruitful. This rule detects BianLian’s custom Go backdoor.
  • Credential Access: Account manipulation via net.exe
    • “Net user” is too loud to alert on in most environments, but we recommend alerting on a threshold of “net user” executions. Even a threshold as high as 10 events in 15 minutes would have detected BianLian in the attacks witnessed.
  • Execution: Unknown binary launching PowerShell
    • If leveraging an EDR that classifies binaries as known and unknown, searching for unknown binaries launching PowerShell will frequently detect use of the BianLian backdoor
  • Defense Evasion: Reg.exe modifying safeboot keys
    • BianLian added a remote access tool to safeboot keys in order to enable network access for their remote access tool in safeboot.

IOCs

Redacted researchers provided the following indicators of compromise:

Indicator Type Notes
104.207.155[.]133 IP Address Historical IP
104.238.61[.]153 IP Address Historical IP
146.70.44[.]248 IP Address Historical IP
155.94.160[.]241 IP Address Historical IP
167.88.15[.]98 IP Address Historical IP
172.96.137[.]107 IP Address Historical IP
188.166.81[.]141 IP Address Historical IP
194.26.29[.]131 IP Address Historical IP
194.5.212[.]205 IP Address Historical IP
194.58.119.159 IP Address Historical IP
198.252.108[.]34 IP Address Historical IP
202.66.72[.]7 IP Address Historical IP
208.123.119[.]145 IP Address Historical IP
209.141.54[.]205 IP Address Historical IP
23.227.198[.]243 IP Address Historical IP
23.94.56[.]154 IP Address Historical IP
43.155.116[.]250 IP Address Historical IP
45.144.30[.]139 IP Address Historical IP
45.92.156[.]105 IP Address Historical IP
5.188.6[.]118 IP Address Historical IP
5.230.67[.]2 IP Address Historical IP
85.13.116[.]194 IP Address Historical IP
85.13.117[.]219 IP Address Historical IP
89.22.224[.]3 IP Address Historical IP
104.225.129[.]86 IP Address Active IP
104.238.223[.]10 IP Address Active IP
104.238.223[.]3 IP Address Active IP
109.248.6[.]207 IP Address Active IP
13.49.57[.]110 IP Address Active IP
144.208.127[.]119 IP Address Active IP
146.0.79[.]9 IP Address Active IP
157.245.80[.]66 IP Address Active IP
16.162.137[.]220 IP Address Active IP
165.22.87[.]199 IP Address Active IP
172.93.96[.]61 IP Address Active IP
172.93.96[.]62 IP Address Active IP
18.130.242[.]71 IP Address Active IP
185.108.129[.]242 IP Address Active IP
185.225.69[.]173 IP Address Active IP
185.56.80[.]28 IP Address Active IP
185.62.58[.]151 IP Address Active IP
185.69.53[.]38 IP Address Active IP
192.145.38[.]242 IP Address Active IP
192.161.48[.]43 IP Address Active IP
192.169.6[.]232 IP Address Active IP
37.235.54[.]81 IP Address Active IP
45.9.150[.]132 IP Address Active IP
5.2.79[.]138 IP Address Active IP
51.68.190[.]20 IP Address Active IP
54.173.59[.]51 IP Address Active IP
62.84.112[.]68 IP Address Active IP
64.52.80[.]120 IP Address Active IP
66.135.0[.]42 IP Address Active IP
83.136.180[.]12 IP Address Active IP
85.13.117[.]213 IP Address Active IP
85.13.117[.]218 IP Address Active IP
91.199.209[.]20 IP Address Active IP
95.179.137[.]20 IP Address Active IP
1fd07b8d1728e416f897bef4f1471126f9b18ef108eb952f4b75050da22e8e43 SHA256 Encryptor
b60be0b5c6e553e483a9ef9040a9314dd54335de7050fed691a07f299ccb8bc6 SHA256 Encryptor
cbab4614a2cdd65eb619a4dd0b5e726f0a94483212945f110694098194f77095 SHA256 Encryptor
eaf5e26c5e73f3db82cd07ea45e4d244ccb3ec3397ab5263a1a74add7bbcb6e2 SHA256 Encryptor
001f33dd5ec923afa836bb9e8049958decc152eeb6f6012b1cb635cff03be2a2 SHA256 Backdoor
1a1177363be7319e7fb50ac84f69acb633fd51c58f7d2d73a1d5efb5c376f256 SHA256 Backdoor
20bab94e6d9c8ed4832ce3b58f9150b16f9e5f40ffdcb747e10366cab5a30352 SHA256 Backdoor
36281d02e28dd26a1db37ebe36941fc9eb1748868e96b544f227b3b59de51fea SHA256 Backdoor
3bdcc81931687abac9e6ba4c80d4d596cebb470c80f56213aa29d3da43925537 SHA256 Backdoor
50c86fb27bed1962903a5f9d155544e3fdb859ae19e967a10f0bf3a60bb8954f SHA256 Backdoor
5d429e05cede806ecea2e99116cac09558fcc0011095201e66c2e65c42f80fcf SHA256 Backdoor
64065c29b369881ee36314c0d15e442510027186fd9087aec0f63e22a5c6f24c SHA256 Backdoor
6d7009df2fa033f7adc30793ebd5254ef47a803950e31f5c52fa3ead1197599f SHA256 Backdoor
8084eddfdb157edf8b1c0cdf8bf4d4e4aaa332fc871c2892aa4113b5148ac63e SHA256 Backdoor
8592862cd28bcc23cfbcf57c82569c0b74a70cd7ea70dbdee7421f3fafc7ecaf SHA256 Backdoor
86a9b84c6258c99b3c3c5b94a2087bc76a533f6043829ded5d8559e88b97fb2f SHA256 Backdoor
9b7a0117a27dc418fbf851afcd96c25c7ad995d7be7f3d8d888fa26a6e530221 SHA256 Backdoor
bb2e9fd9d60f49f0fc2c46f8254e5617d4ec856f40256554087cda727a5f6019 SHA256 Backdoor
c0fe7bfb0d1ffeb61fb9cafeeab79ffd1660ff3637798e315ff15d802a3c974e SHA256 Backdoor
c7fe3fc6ffdfc31bc360afe7d5d6887c622e75cc91bc97523c8115b0e0158ad6 SHA256 Backdoor
cd17afd9115b2d83e948a1bcabf508f42d0fe7edb56cc62f5cc467c938e45033 SHA256 Backdoor
d602562ba7273695df9248a8590b510ccd49fefb97f5c75d485895abba13418d SHA256 Backdoor
da7a959ae7ea237bb6cd913119a35baa43a68e375f892857f6d77eaa62aabbaf SHA256 Backdoor
dda89e9e6c70ff814c65e1748a27b42517690acb12c65c3bbd60ae3ab41e7aca SHA256 Backdoor
de31a4125eb74d0b7cbf2451b40fdb2d66d279a8b8fd42191660b196a9ac468f SHA256 Backdoor
f7a3a8734c004682201b8873691d684985329be3fcdba965f268103a086ebaad SHA256 Backdoor

MITRE TTPs

Redacted researchers provided the following MITRE ATT&CK tactics, techniques, and procedures:

ID Technique
T1190 Initial Access: Exploit Public-Facing Application
T1047 Execution: Windows Management Instrumentation
T1059.001 Execution: Command and Scripting Interpreter: PowerShell
T1098 Persistence: Account Manipulation
T1078 Persistence: Valid Accounts
T1562.001 Defense Evasion: Impair Defenses: Disable or Modify Tools
T1526.004 Defense Evasion: Impair Defenses: Disable or Modify System Firewall
T1036 Defense Evasion: Masquerading
T1112 Defense Evasion: Modify Registry
T1069 Discovery: Permission Groups Discovery
T1018 Discovery: Remote System Discovery
T1021.001 Lateral Movement: Remote Services: Remote Desktop Protocol
T1021.005 Lateral Movement: Remote Services: VNC
T1021.006 Lateral Movement: Remote Services: Windows Remote Management
T1090 Command and Control: Proxy
T1071.001 Command and Control: Application Layer Protocol: Web Protocol
T1486 Impact: Data Encrypted for Impact

More Recent Blog Posts