• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Malware • Ransomware  /  Beware! A new .Net Ransomware is encrypting files with .Lime
Beware! A new .Net Ransomware is encrypting files with .Lime
06 March 2018

Beware! A new .Net Ransomware is encrypting files with .Lime

Written by Bajrang Mane
Bajrang Mane
Malware, Ransomware
1
Share

Cases of the “Lime ransomware” have been recently reported to Quick Heal Security Labs. Our research team has analyzed these cases deeply and found some useful information. This post shares this information to help users stay safe from ransomware attacks.

‘Lime’ is a newly discovered .net ransomware; it is also known as the ‘BigEyes’ ransomware. It uses two major ways to infect user’s systems, either spam emails or malicious downloads.

Ransomware usually comes into the system without the user’s knowledge through online activities like software bundling, spam email attachments, infected links, malvertising, by visiting unknown sites, RDP (Remote desktop protocol) and exploit kits.

Infection vector

Fig 1 Lime Ransomware attack chain

Technical analysis

Encryption Process: in-depth description

Lime is a ransomware that encrypts your files and demands Bitcoin as a ransom to get your files restored. Files are locked with the AES-256 encryption algorithm. The Lime ransomware encrypts your files and appends the “.Lime” extension.

After encryption, the Lime ransomware drops a ransom note Fig 2.

Fig 2 Ransom note

The following e-mail address is used to contact the malware author to decrypt the encrypted files by paying them:

“r3vo@protonmail-com”

Key generation

When Lime is first launched, it will call RandomString() function which will attempt to generate an AES key. It generates 50 bytes array from input string using a random index with the use of random() function to fetch one character and stores into output string as shown in Fig 3.

Fig 3 Random Key Generation code

It calculates md5 of generated output string using Computehash() and then it will copy the result into the result array. It will use this result array as an AES key to encrypt the files present on the system.

Fig 4 AES Key Generation code

It drops output string at path “C:\Microsoft” by name “hash”. As we know that AES is symmetric algorithm so the key used for encryption and decryption will be the same. So, the malware author uses this hash file’s MD5 to decrypt the victim’s files when victim pays ransom amount to him.

Lime ransomware encrypts files on specific folder paths using AES-256 in ECB mode to encrypt files. Paths are as per given below:

  • My Music
  • My Pictures
  • My Videos
  • Desktop
  • UserProfile

Components used in AES

Different modes used in AES:-  ECB, CBC, CFB, OFB, CTR.
Key:- AES-128(16 Bytes), AES-192(24 Bytes), AES-256(32 Bytes)
IV:- Initialization vector to use for encryption or decryption

It encrypts files using AES-256 (32-byte key length) in ECB (Electronic Code Book) mode. In ECB mode, it doesn’t require IV (Initialization vector) for the encryption or decryption process.

For all other modes, it uses IV (Initialization vector). IV is optional and when IV is not present then it will be given a default value of all zeroes.

Modification in file extension

List of extensions of files which get encrypted by Lime ransomware:

.c, .cpp, .py, .ini, .hiv, .avi, .bmp, .log, .pdf, .zip, .bak, .rtf, .png, .wsf, .wsc, .ws, .vsw, .vst, .vss, .vsmac, .ros, .vbs, .vbe, .vb, .url, .tmp, .shs, .shb, .sct, .scr, .scf, .reg, .pst, .prg, .pif, .pcd, .ops, .mst, .msp, .msi, .msc, .mdz, .mdw, .mdt, .mde, .mdb, .mda, .maw, .mav, .mau, .mat, .mas, .mar, .maq, .mam, .mag, .maf, .mad, .lnk, .ksh, .jse, .js, .its, .isp, .ins, .inf, .hlp, .fxp, .exe, .csh, .crt, .cpl, .com, .cmd, .chm, .cer, .bat, .pdf, .pot, .xlt, .pps, .xlw, .dot, .rtf, .ppt, .xls, .doc, .xml, .htm, .html, .hta, .app, .asp

The extension ‘.lime’ is placed as a secondary extension, without altering the original names and its extension.

Example:

Original file name  :  mydemo.cpp
After encryption      :  mydemo.cpp.Lime

And yes! Recovery of Encrypted File is possible

We can decrypt all files which are encrypted by “Lime Ransomware”. The key is 32 bytes which is generated from MD5 of “hash” file which is dropped at “C:\Microsoft” location of victim’s mchine. So, the key is different for different victim.

To decrypt files, AES-256 is used in the ECB mode and key for that will be generated as given below,

If MD5 of hash file is dropped on the victim’s machine: “05FF78F91FE2D008018A2F53792C0C28”

Key generation from MD5

Take 15 bytes from MD5 + Take 16 bytes from MD5 + Append zero=32 bytes key
Key = 05FF78F91FE2D008018A2F53792C0C + 05FF78F91FE2D008018A2F53792C0C28 + 00
Key = 05FF78F91FE2D008018A2F53792C0C05FF78F91FE2D008018A2F53792C0C2800

Process killing

It checks the presence for specific processes and try to kill these processes. These process names are as follows:

  • Taskmgr
  • Cmd
  • Bdagent
  • ProcessHacker
Fig 5 Process killing

Indicators of compromise

  1. MD5: E1B571F1AD5266156C8233FA0D2BA1E0
  2. C:\Microsoft\hash
  3. The extension “.Lime” is placed as a secondary extension, without altering the original names and its extension.

Seqrite protects its users from the Lime ransomware

Seqrite EPS detected and successfully eliminated this threat using Static Detection and Behavior-based Detection.

  • Malicious files are detected as “Ransom.Lime.S1809905”

How to stay away from ransomware

  1. Use a multi-layered antivirus in your system which will protect you from real-time threats.
  2. Keep your antivirus up-to-date.
  3. Update your Operating System regularly as critical patches are released almost every day.
  4. Keep your software up-to-date. Older and outdated versions of software have Vulnerabilities which are almost always exploited by attackers to infect a system with ransomware and other malware.
  5. Never directly connect remote systems to the Internet. Always use a VPN (Virtual Remote Network) to access a network remotely.
  6. Do not click on links or download attachments in emails received from unexpected or unknown sources.
  7. Take regular data backup and keep it in a secure location.
  8. Do not open suspicious email attachments.

 Subject Matter Experts

Prashant Indalkar, Pandurang Terkar | Quick Heal Security Labs

 Previous PostHow Cyber War Games can help you improve Incident Response Plan?
Next Post  Seqrite Endpoint Security Cloud: The future of endpoint security
Bajrang Mane

About Bajrang Mane

Bajrang Mane is leading the Threat Analysis, Incident response, and Automation teams in Quick Heal Security Labs. Having spent 13 years in the IT security industry,...

Articles by Bajrang Mane »

Related Posts

  • SnakeKeylogger: A Multistage Info Stealer Malware Campaign

    March 25, 2025
  • SVC New Stealer on the Horizon

    March 21, 2025
  • Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

    March 11, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies