Defray777

Defray777, Defray, Defray 2018, Target777, Ransom X, RansomExx, Glushkov
(Type: Ransomware, Big Game Hunting)

(Palo Alto) Defray777 is an elusive family of ransomware also known as Ransom X and RansomExx. Although it has recently been covered in the news as a new family, it has been in use since at least 2018 and is responsible for a number of high-profile ransomware incidents -- as detailed in the articles we linked to. Defray777 runs entirely in memory, which is why there have been so few publicly discussed samples to date. In several recent incidents, Defray777 was loaded into memory and executed by {{Cobalt Strike}}, which was delivered by the {{Vatet}} loader.

[News Analysis] Trends:

Total Trend: 9

Trend Per Year
3
2017
6
2020


Trend Per Month
2
Aug 2017
1
Sep 2017
1
2020
1
Jan 2020
1
Feb 2020
1
Sep 2020
2
Nov 2020



[News Analysis] News Mention Another Threat Name:

2 - LaZagne21 - Defray2 - PlugX3 - PyXie13 - FastCash13 - Cerber16 - Dharma16 - FriedEx16 - Gandcrab16 - GlobeImposter13 - Mamba16 - Phobos13 - Rapid Ransom16 - REvil16 - Ryuk16 - SamSam13 - Zeus11 - Matrix Ransom11 - MedusaLocker11 - Scarab Ransomware3 - Cobalt Strike3 - GOLD DUPONT


[TTP Analysis] Technique Performance:



[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

News Article (Credit @Malpedia)

Weaponizing Open Source Software for Targeted Attacks

2020-11-20 by Abraham Camba from Trend Micro

Next Up: “PyXie Lite”

2020-11-06 by Ryan Tracey from Palo Alto Networks Unit 42

Government software provider Tyler Technologies hit by ransomware

2020-09-23 by Lawrence Abrams from Bleeping Computer

Feds Fighting Ransomware: How the FBI Investigates and How You Can Help

2020-02-25 by Joel DeCapua from RSA Conference

Is It Wrong to Try to Find APT Techniques in Ransomware Attack?

2020-01-17 by Tamada Kiyotaka from Secureworks

GOLD DUPONT

2020 by SecureWorks from Secureworks

Defray Ransomware Hits Healthcare and Education

2017-09-26 by Cylance Threat Research Team from Threat Vector

New Defray Ransomware Targets Education and Healthcare Verticals

2017-08-24 by Proofpoint Staff from Proofpoint

Defray - New Ransomware Targeting Education and Healthcare Verticals

2017-08-24 by Proofpoint Staff from Proofpoint

Basic Information (Credit @etda.or.th)

Tool: Defray777

Names: Defray777, Defray, Defray 2018, Target777, Ransom X, RansomExx, Glushkov

Description: (Palo Alto) Defray777 is an elusive family of ransomware also known as Ransom X and RansomExx. Although it has recently been covered in the news as a new family, it has been in use since at least 2018 and is responsible for a number of high-profile ransomware incidents -- as detailed in the articles we linked to. Defray777 runs entirely in memory, which is why there have been so few publicly discussed samples to date. In several recent incidents, Defray777 was loaded into memory and executed by {{Cobalt Strike}}, which was delivered by the {{Vatet}} loader.

Category: Malware

Type: Ransomware, Big Game Hunting

Information: https://unit42.paloaltonetworks.com/vatet-pyxie-defray777/3/

Information: https://www.trendmicro.com/vinfo/pl/security/news/cyber-attacks/defray-ransomware-sets-sights-on-healthcare-and-other-industries

Information: https://www.csoonline.com/article/3604599/sprite-spider-emerging-as-one-of-the-most-destructive-ransomware-threat-actors.html

Information: https://blogs.vmware.com/networkvirtualization/2021/03/deconstructing-defray777.html/

Information: https://www.cybereason.com/blog/cybereason-vs.-ransomexx-ransomware

Information: https://blogs.blackberry.com/en/2017/09/cylance-vs-defray-ransomware

Information: https://securityintelligence.com/posts/ransomexx-upgrades-rust/

Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.defray

Alienvault-otx: https://otx.alienvault.com/browse/pulses?q=tag:defray777

Last-card-change: 2022-12-28

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact