top of page
Writer's pictureSecneurX Threat Analysis

What is Snwkz Ransomware ?

Secneurx Analyst found Snwkz ransomware in the wild and analyzed the sample. Snwkz ransomware belongs to the hive ransomware family. Snwkz encrypts files and appends its extension("IX80S4ljl90EfQFpDP8Hu_RED4_OTfMZ7WEBAYZLNrH.(randomstrings).snwkz") to filenames. Also, it drops the ransomware note "Djfk_HOW_TO_DECRYPT.txt". After executing the Snwkz ransomware all files and folders got encrypted and their filenames were appended with a ".IX80S4ljl90EfQFpDP8Hu_RED4_OTfMZ7WEBAYZLNrH.(randomstrings).snwkz" extension.


For Example, a file titled as "Sep2019.docx" appeared as "Sep2019.docx.IX80S4ljl90EfQFpDP8Hu_RED4_OTfMZ7WEBAYZLNrH.(randomstrings).snwkz", and "Jan2020.docx" as "Jan2020.docx.IX80S4ljl90EfQFpDP8Hu_RED4_OTfMZ7WEBAYZLNrH.(randomstrings).snwkz", and so on.


Screenshot of files encrypted by Snwkz ransomware



Snwkz Ransomware Overview


Snwkz ransomware notes inform victims that the network was breached and their files have been encrypted. It instructs victims to purchase decrypt tool from their mentioned website and also mentioned their sales department website in ransomware note.


How does ransomware infect my computer?


Malware (ransomware included) is spread using phishing and social engineering tactics. Malicious programs are typically presented as or bundled with ordinary content. Infectious files can be executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), Microsoft Office and PDF documents, JavaScript, and so on. When a virulent file is executed, run, or otherwise opened - the infection process is jumpstarted.


Screenshot of Snwkz Ransomware Text file (“Djfk_HOW_TO_DECRYPT.txt”)


Ransomware Note (Djfk_HOW_TO_DECRYPT.txt) in Text


Your network has been breached and all data were encrypted.

Personal data, financial reports and important documents are ready to disclose.


To decrypt all the data and to prevent exfiltrated files to be disclosed at

hxxp[:]//hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd[.]onion/

you will need to purchase our decryption software.


Please contact our sales department at:

hxxp[:]//hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd[.]onion/


Follow the guidelines below to avoid losing your data:

- Do not modify, rename or delete *.key.snwkz files. Your data will be

undecryptable.

- Do not modify or rename encrypted files. You will lose them.

- Do not report to the Police, FBI, etc. They don't care about your business.

They simply won't allow you to pay. As a result you will lose everything.

- Do not hire a recovery company. They can't decrypt without the key.

They also don't care about your business. They believe that they are

good negotiators, but it is not. They usually fail. So speak for yourself.

- Do not reject to purchase. Exfiltrated files will be publicly disclosed.


IOC DETAILS

SHA256


47dbb2594cd5eb7015ef08b7fb803cd5adc1a1fbe4849dc847c0940f1ccace35


What can you do to avoid being a ransomware victim?


As dangerous as ransomware is, simply being aware and staying updated with the latest ransomware trends can go a long way in securing your data and systems. Here are helpful tips on how you can defend yourself from a likely attack.


Scrutinize emails & its attachments before opening them


Be wary of emails from unverified sources. You can check by communicating directly with the purported sender to confirm if they sent the messages. To check its validity, you can use SecneurX Sandbox to verify the sanity of the email.


Avoid clicking embedded links found in unverified emails


Such social engineering tricks can lead to the download of ransomware. Additionally, be wary of sites that prompt you to enter a CAPTCHA code as this could be linked to a ransomware attack. To check its validity, you can use services like SecneurX Sandbox to verify the reputation of the site.


Back up your important files


While prevention is always better than the cure, having a backup of important files can at least lessen the potential damage done by a ransomware attack. While being locked out of your own system is always a bad thing, at least it's not a total disaster since you can always retrieve your important files. The 3-2-1 backup rule applies here—three backup copies of your data on two different media, and one of those copies in a separate location.


Regularly update software, programs, applications


Updating them to the latest versions can provide an added layer of protection against online threats as some ransomware arrive via vulnerability exploits.


Use a layered protection suite


Doing so can detect threats before they enter your network. Security solutions like SecneurX ATP can block Infectious files (like executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), Microsoft Office and PDF documents, JavaScript, and so on) by scanning them at the point of entry of the organizations (File uploads, USB file transfers etc.

45 views0 comments

コメント


bottom of page