• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Ransomware • Technical  /  Unveiling Abyss Locker: The Rapid Rise of a Menacing Ransomware Threat
Unveiling Abyss Locker: The Rapid Rise of a Menacing Ransomware Threat
11 April 2024

Unveiling Abyss Locker: The Rapid Rise of a Menacing Ransomware Threat

Written by Soumen Burma
Soumen Burma
Ransomware, Technical

Introduction: 

Originating in March 2023, Abyss Locker, a recently established ransomware operation, has swiftly targeted companies, transforming into a significant threat across various sectors, such as industrial control systems (ICS), enterprises, and public-sector organizations. It poses a significant threat to both Windows and Linux systems. 

This escalation is tied to introducing a bespoke Linux encryptor, meticulously crafted to infiltrate VMware’s ESXi virtualized environments. This strategic move expands Abyss Locker’s reach and amplifies its impact across diverse sectors. 

The Abyss ransomware, seemingly associated with the HelloKitty ransomware infrastructure, has undergone a notable modification in its encryption algorithm, shifting from AES to salsa_20. This adaptability highlights the group’s sophisticated tactics and poses an increased risk to cybersecurity.  

Technical Analysis: 

Firstly, it creates a Log file and then acts on the hardcoded list of services and processes. 

Fig: List of services to be terminated

It terminates the following services: 

Fig: Services to be terminated

The ransomware ensures it terminates a specified list of processes before commencing its operations, thereby preventing any interference from these processes with accessing and encrypting files on the victim’s system. 

The following processes are killed: 

Fig: Processes to be killed

Fig: List process compared with the running process

Fig: Process is ended with a terminate process API call 

It uses the following commands to delete the shadow copy and disable the recovery boot options 

  • vssadmin.exe  delete shadows /all /quiet 
  • wmic  SHADOWCOPY DELETE 
  • bcdedit  / set{ default } recoveryenabled No 
  • bcdedit  / set{ default } bootstatuspolicy IgnoreAllFailures 

Fig: Use of CMD

Mutex Creation by Abyss: 

It checks if there is any “DontWorryBeHappy” mutex present or not. Otherwise, it will create the mutex using the same name.  

Fig: Creation of Mutex 

Folders, files, and extension exclusion by Abyss:  

The ransomware employs a thread routine to encrypt the victim’s data, concurrently conducting checks for excluded files and excluded extensions within the same thread. This dual functionality is evident in the encryption function illustrated in the figure below. 

Fig: Traversing files and extensions for exclusion 

Abyss ransomware has hard coded the folder, files, and extensions to be excluded at the time of encryption, as mentioned in the below figures: 

Fig: Excluded folder from the encryption routine

Fig: Excluded files from the encryption routine

Fig: Excluded extension from the encryption routine

Encryption: 

Encryption threads are created based on the number of existing processors, with a maximum limit of 64 threads. 

Fig: Encryption thread 

It uses the salsa_20 encryption mechanism to encrypt the samples. 

Fig: Use of Salsa_20 for encryption 

Ransom Note: 

It drops the Ransom Note on the Desktop, and each directory has the name “WhatHappened.txt.” It contains the Tor link to communicate with attackers. 

Fig: Ransom note 

Fig: Appended. Abyss as extension 

After encryption, it also set the desktop wallpaper as a ransom note. 

Tips to prevent such kinds of attacks. 

Regularly update your operating system, applications, and software to fix any known vulnerabilities that are often exploited by Attackers. 

Use security software that can protect the system from the latest threats. 

Be cautious with email attachments, especially from unknown senders. Avoid clicking on suspicious links or downloading files from untrusted sources.  

Seqrite Protection: 

Ransom.Rook.S32195182  

Conclusion: 

Emerging in July 2023, Abyss Locker ransomware traces its roots back to the HelloKitty ransomware source code, revealing a lineage that predates its official release. It uses the sala20 algorithm to encrypt files. 

In line with typical ransomware behavior, Abyss Locker infiltrates corporate networks, engages in data exfiltration for extortion purposes, and encrypts devices, presenting a significant threat to systems running both Linux and Windows operating systems. 

MITRE ATT&CK TTPs: 

 

IOCs: 

3B55904D3B37C810FC230B991A257939 

2E4C626E67DF46B2A7258E73C04C4F73 

B1095D0837DD11B5280FCB29B5A1BB84 

18BAEDF43F4A68455E8D36B657AFF03C 

D75E1C01C59B63D73F22E84A8A8819BF 

6FF538DFD4B6A6FA796EA74EED50C80E 

E93EDA81803040E70D64168C8A83228F 

2442FF56720D1887CB46DD37ED732407 

4704CD96029606D6F501826D41805486 

0B53120151A20A46EDF3EF85B8AC450F  

 

Author: 

Soumen Burma 

Co-author: 

Vaibhav Krushna Billade 

 Previous PostPreparing the Manufacturing Industry for New Age Cyber Attacks
Next Post  CVE-2024-3094 Unveiled: XZ Utils Compromise Sparks Security Alarm
Soumen Burma

About Soumen Burma

Soumen is a Security Researcher 2 at Quick Heal Technologies. He is interested in Reverse Engineering, Malware analysis and...

Articles by Soumen Burma »

Related Posts

  • Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants

    May 12, 2025
  • Security Flaw in Yelp Help Viewer (CVE-2025-3155)

    May 12, 2025
  • CVE-2025-24813: Remote Code Execution in Apache Tomcat via Malicious Session Deserialization

    CVE-2025-24813: Remote Code Execution in Apache Tomcat via Malicious Session Deserialization

    April 10, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies