• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Ransomware  /  Another Ransomware Outbreak! This time it’s Bad Rabbit
Another Ransomware Outbreak! This time it’s Bad Rabbit
25 October 2017

Another Ransomware Outbreak! This time it’s Bad Rabbit

Written by Seqrite
Seqrite
Cybersecurity, Ransomware

The recent Bad Rabbit ransomware outbreak is currently making headlines. This post outlines the analysis of the ransomware by Quick Heal Security Labs.

According to our telemetry, we have not seen any Bad Rabbit ransomware infection on our customer’s machines so far.

Propagation technique
Bad Rabbit is distributed via a drive-by-download attack from the below URL

hxxp://1dnscontrol[.]com/flash_install.php

The payload is pretending to be a bogus Adobe Flash Player update named as “install_flash_player.exe”. The ransomware escalates itself to the administrative privilege using UAC prompt. Further, it drops ‘C:\Windows\infpub.dat’ which is actually a DLL file executed through ‘rundll32.exe’ as seen in the execution flow below.

Execution flow

bad-rabbit-1
Fig 1. Execution flow

Dropped artifacts                                             

Bad Rabbit ransomware drops multiple artifacts which are named after the dragons in the popular TV series called Game of Thrones.

  • C:\Windows\infpub.dat
    • C:\Windows\System32\Tasks\drogon
    • C:\Windows\System32\Tasks\rhaegal
    • C:\Windows\cscc.dat
    • C:\Windows\dispci.exe

Below is the screenshot of the code from the ransomware to use ‘rundll32.exe’ to execute ‘infpub.dat’.

Fig 2. Infpub.dat creation code snippet
Fig 2. Infpub.dat creation code snippet

The ‘infpub.dat’ drops a malicious executable ‘dispci.exe’ at ‘C:\Windows’ which is responsible for Disk Encryption.

The ‘infpub.dat’ creates two tasks with names ‘drogon’ which is used to force restart the system and ‘rhaegal’ which is used to start a program at startup.

Fig 3. Drogon task properties
Fig 3. Drogon task properties
Fig 4: Rhaegal task properties
Fig 4: Rhaegal task properties

Infpub.dat is also responsible for file encryption using a shared public RSA-2048 key of the attacker for the list of file extensions as seen below.

Fig 5. RSA Key and file extensions
Fig 5. RSA Key and file extensions

The dropped file ‘dispci.exe’ uses version information from a genuine DiskCryptor utility which is responsible for MBR infection which stops the boot-up process of the affected system until the ransom is paid as shown in the image below.

Fig 6. Ransom note
Fig 6. Ransom note

How it spreads in the network

The ‘infpub.dat’ tries to brute-forces login credentials using hard-coded credentials and also uses Mimikatz module to extract NTLM credentials from the system memory. These credentials are used to access other network workstations and server on the same network via SMB and WebDAV.

Fig 7. SMB share enumeration
Fig 7. SMB share enumeration
Fig 8: SMB login – Brute force
Fig 8: SMB login – Brute force

Similarities between Bad Rabbit ransomware and NotPetya ransomware

  • Drops DLL files in Windows folder with ‘.dat’ extension and executes it using ‘rundll32.exe’ with ordinal 1 (#1).
  • Use of ‘MimiKatz’ module for extraction of NTLM credentials
  • Uses schedule task to restart system using ‘shutdown.exe’
  • Displays a similar ransom note after MBR infection
  • Uses WMI and SMB for spreading across network

Although both the ransomware share quite a lot of similarities, Bad Rabbit is not a wiper.

Indicators of compromise

SHA256 Filename
630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da install_flash_player.exe
8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93 dispci.exe
579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648 infpub.dat

Malicious URLs

  • https://1dnscontrol[.]com
  • https://1dnscontrol[.]com/flash_install.php

Seqrite Detection

  • Trojanransom.Gen
  • Ransom.Tibbar
  • Ransom.BadRabbit.A5
  • Ransom.BadRabbit.B5
  • Ransom.BadRabbit.C5
  • Ransom.Badrabbit.PB5

disinstalflashplayer

How to stay safe

  • Never download software from pop-up ads or websites that don’t belong to the software vendor (in this case – Adobe).
  • Never click on links or download attachments that arrive in emails from unwanted, unknown or unexpected sources.
  • Apply all recommended security updates for Operating System and programs like Adobe, JAVA, Web browsers, etc.
  • Take regular backups of your important data in secure online and offline locations.
  • Use a layered security software and keep it updated.

Subject Matter Experts

Anita Ladkat, Shantanu Vichare, Prashil Moon, Shriram Munde, Prakash Galande | Quick Heal Security Labs

 Previous PostProtect your files or pay ransom: What will you choose?
Next Post  Major security issues that keep your organization’s CISO up...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies