{"id":124778,"date":"2021-07-16T09:49:41","date_gmt":"2021-07-16T16:49:41","guid":{"rendered":"\/blogs\/?p=124778"},"modified":"2024-06-25T22:43:08","modified_gmt":"2024-06-26T05:43:08","slug":"revil-ransomware-uses-dll-sideloading","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/","title":{"rendered":"REvil Ransomware Uses DLL Sideloading"},"content":{"rendered":"<p>This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal<\/p>\n<h2>Introduction<\/h2>\n<p>Ransomware attacks are one of the most common cyber-attacks among organizations; due to an increase in <strong>Ransomware-as-a-service (RaaS)<\/strong> on the black market. RaaS provides readily available ransomware to cyber criminals and is an effective way for attackers to deploy a variety of ransomware in a short period of time.<\/p>\n<p>Usually, <strong>RaaS<\/strong> model developers sell or rent their sophisticated ransomware framework on the black market. After purchasing the license from the ransomware developer, attackers spread the ransomware to other users, infect them, encrypt files, and demand a huge ransom payment in Bitcoin. \u00a0Also, there are discounts available on the black market for ransomware frameworks in which the ransom money paid is shared between developers and the buyer for every successful extortion of ransom from the victims. These frameworks reduce the time and effort of creating a new ransomware from scratch using latest and advanced programming languages.<\/p>\n<p><strong>REvil<\/strong> is one of the most famous <strong>ransomware-as-a-service (RaaS)<\/strong> providers. The group released the <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-the-all-stars\/\" target=\"_blank\" rel=\"noopener\">Sodinokibi ransomware<\/a> in 2019, and McAfee has since observed REvil using a DLL side loading technique to execute ransomware code. The actual ransomware is a dropper that contains two embedded PE files in the resource section.\u00a0 After successful execution, it drops two additional files named MsMpEng.exe and MpSvc.dll in the temp folder. The file MsMpEng.exe is a Microsoft digitally signed file having a timestamp of March 2014 (Figure 1).<\/p>\n<h2><em><u>DLL SIDE LOADING<\/u><\/em><\/h2>\n<p>The malware uses DLL side loading to execute the ransomware code. This technique allows the attacker to execute malicious DLLs that spoof legitimate ones. This technique has been used in many APTs to avoid detection. In this attack, MsMpEng.exe loads the functions of MpSvc.dll during the time of execution. However, the attacker has replaced the clean MpSvc.dll with the ransomware binary of the same name. The malicious DLL file has an export function named <strong>ServiceCrtMain<\/strong>, which is further called and executed by the Microsoft Defender file. This is a clever technique used by the attacker to execute malicious file using the Microsoft digitally signed binary.<\/p>\n<h2><em><u>PAYLOAD ANALYSIS<\/u><\/em><\/h2>\n<p>The ransomware uses the RC4 algorithm to decrypt the config file which has all the information that supports the encryption process.<\/p>\n<p>Then it performs a UI language check using <strong>GetSystemDefaultUILanguage\/GetUserDefaultUILanguage<\/strong> functions and compares it with a hardcoded list which contains the language ID of several countries as shown in below image.<\/p>\n<p>Countries excluded from this ransomware attack are mentioned below:<\/p>\n<table width=\"483\">\n<tbody>\n<tr>\n<td width=\"242\"><strong>GetUserDefaultUILanguage <\/strong><\/td>\n<td width=\"242\"><strong>Country name<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x419<\/td>\n<td width=\"242\">Russian<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x422<\/td>\n<td width=\"242\">Ukranian<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x423<\/td>\n<td width=\"242\">Belarusian<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x428<\/td>\n<td width=\"242\">Tajik (Cyrilic from Tajikistan)<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x42B<\/td>\n<td width=\"242\">Armenian<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x42C<\/td>\n<td width=\"242\">Azerbaijani (Latin from Azerbaijan)<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x437<\/td>\n<td width=\"242\">Georgian<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x43F<\/td>\n<td width=\"242\">Kazakh from Kazakhastan<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x440<\/td>\n<td width=\"242\">Kyrgyzstan<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x442<\/td>\n<td width=\"242\">Turkmenistan<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x443<\/td>\n<td width=\"242\">Latin from Uzbekistan<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x444<\/td>\n<td width=\"242\">Tatar from Russia Federation<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x818<\/td>\n<td width=\"242\">Romanian from Moldova<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x819<\/td>\n<td width=\"242\">Russian from Moldova<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x82C<\/td>\n<td width=\"242\">Cyrilic from Azerbaijan<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x843<\/td>\n<td width=\"242\">Cyrilic from Uzbekistan<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x45A<\/td>\n<td width=\"242\">Syriac<\/td>\n<\/tr>\n<tr>\n<td width=\"242\">0x281A<\/td>\n<td width=\"242\">Cyrilic from Serbia<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Additionally, the ransomware checks the users <strong>keyboardlayout<\/strong> and it skips the ransomware infection in the machine\u2019s which are present in the country list above.<\/p>\n<p>Ransomware creates a Global mutex in the infected machine to mark its presence.<\/p>\n<p>After creating the mutex, the ransomware deletes the files in the recycle bin using the <strong>SHEmptyRecycleBinW <\/strong>function to make sure that no files are restored post encryption.<\/p>\n<p>Then it enumerates all the active services with the help of the <strong>EnumServicesStatusExW <\/strong>function and deletes services if the service name matches the list present in the config file. The image below shows the list of services checked by the ransomware.<\/p>\n<p>It calls the <strong>CreateToolhelp32Snapshot<\/strong>, <strong>Process32FirstW <\/strong>and <strong>Process32NextW <\/strong>functions to enumerate running processes and terminates those matching the list present in the config file.\u00a0 The following processes will be terminated.<\/p>\n<ul>\n<li>allegro<\/li>\n<li>steam<\/li>\n<li>xtop<\/li>\n<li>ocssd<\/li>\n<li>xfssvccon<\/li>\n<li>onenote<\/li>\n<li>isqlplussvc<\/li>\n<li>msaccess<\/li>\n<li>powerpnt<\/li>\n<li>cad<\/li>\n<li>sqbcoreservic<\/li>\n<li>thunderbird<\/li>\n<li>oracle<\/li>\n<li>infopath<\/li>\n<li>dbeng50<\/li>\n<li>pro_comm_msg<\/li>\n<li>agntsvc<\/li>\n<li>thebat<\/li>\n<li>firefox<\/li>\n<li>ocautoupds<\/li>\n<li>winword<\/li>\n<li>synctime<\/li>\n<li>tbirdconfig<\/li>\n<li>mspub<\/li>\n<li>visio<\/li>\n<li>sql<\/li>\n<li>ocomm<\/li>\n<li>orcad<\/li>\n<li>mydesktopserv<\/li>\n<li>dbsnmp<\/li>\n<li>outlook<\/li>\n<li>cadence<\/li>\n<li>excel<\/li>\n<li>wordpad<\/li>\n<li>creoagent<\/li>\n<li>encsvc<\/li>\n<li>mydesktopqos<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Then, it encrypts files using the Salsa20 algorithm and uses multithreading for fast encryption of the files. Later, background wallpaper will be set with a ransom message.<\/p>\n<p>Finally, the ransomware displays ransom notes in the victim\u2019s machine. Below is an image of readme.txt which is dropped in the infected machine.<\/p>\n<h2>IOCs and Coverage<\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"95\"><strong>Type<\/strong><\/td>\n<td width=\"250\"><strong>Value<\/strong><\/td>\n<td width=\"117\"><strong>Detection Name<\/strong><\/td>\n<td width=\"162\"><strong>Detection Package Version (V3)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"95\">Loader<\/td>\n<td width=\"250\">5a97a50e45e64db41049fd88a75f2dd2<\/td>\n<td width=\"117\">REvil.f<\/td>\n<td width=\"162\">4493<\/td>\n<\/tr>\n<tr>\n<td width=\"95\">Dropped DLL<\/td>\n<td width=\"250\">78066a1c4e075941272a86d4a8e49471<\/td>\n<td width=\"117\">REvil.e<\/td>\n<td width=\"162\">4493<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Expert rules allow McAfee customers to extend their coverage. This rule covers this REvil ransomware behaviour.<\/p>\n<h2>MITRE<\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"120\"><strong>Technique ID<\/strong><\/td>\n<td width=\"204\"><strong>Tactic<\/strong><\/td>\n<td width=\"288\"><strong>Technique Details<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1059.003<\/td>\n<td width=\"204\">Execution<\/td>\n<td width=\"288\">Command and Scripting Interpreter<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1574.002<\/td>\n<td width=\"204\">DLL Side-Loading<\/td>\n<td width=\"288\">Hijack Execution Flow<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1486<\/td>\n<td width=\"204\">Impact<\/td>\n<td width=\"288\">Data Encrypted for Impact<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1036.005<\/td>\n<td width=\"204\">Defense Evasion<\/td>\n<td width=\"288\">Masquerading<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1057<\/td>\n<td width=\"204\">Discovery<\/td>\n<td width=\"288\">Process Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1082<\/td>\n<td width=\"204\">Discovery<\/td>\n<td width=\"288\">System Information Discovery<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Conclusion<\/h2>\n<p>McAfee observed that the REvil group has utilized oracle web logic vulnerability (<a href=\"https:\/\/blog.talosintelligence.com\/2019\/04\/sodinokibi-ransomware-exploits-weblogic.html\" target=\"_blank\" rel=\"noopener\">CVE-2019-2725<\/a>) to spread the ransomware last year and used <a href=\"https:\/\/helpdesk.kaseya.com\/hc\/en-gb\/articles\/4403440684689\" target=\"_blank\" rel=\"noopener\">kaseya\u2019s VSA application<\/a> recently for their ransomware execution, with the help of DLL sideloading. REvil uses many vulnerability applications for ransomware infections, however the encryption technique remains the same. McAfee recommends making periodic backups of files and keeping them isolated off the network and having an always updated antivirus in place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks among&#8230;<\/p>\n","protected":false},"author":695,"featured_media":124633,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-124778","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>REvil Ransomware Uses DLL Sideloading | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"REvil Ransomware Uses DLL Sideloading | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-16T16:49:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-26T05:43:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/RT_Threat_Analsysis-e1625780646867.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"314\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"REvil Ransomware Uses DLL Sideloading\",\"datePublished\":\"2021-07-16T16:49:41+00:00\",\"dateModified\":\"2024-06-26T05:43:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/\"},\"wordCount\":879,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/RT_Threat_Analsysis-e1625780646867.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/\",\"name\":\"REvil Ransomware Uses DLL Sideloading | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/RT_Threat_Analsysis-e1625780646867.jpg\",\"datePublished\":\"2021-07-16T16:49:41+00:00\",\"dateModified\":\"2024-06-26T05:43:08+00:00\",\"description\":\"This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/RT_Threat_Analsysis-e1625780646867.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/RT_Threat_Analsysis-e1625780646867.jpg\",\"width\":600,\"height\":314},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"REvil Ransomware Uses DLL Sideloading\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"REvil Ransomware Uses DLL Sideloading | McAfee Blog","description":"This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"REvil Ransomware Uses DLL Sideloading | McAfee Blog","og_description":"This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-07-16T16:49:41+00:00","article_modified_time":"2024-06-26T05:43:08+00:00","og_image":[{"width":600,"height":314,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/RT_Threat_Analsysis-e1625780646867.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"REvil Ransomware Uses DLL Sideloading","datePublished":"2021-07-16T16:49:41+00:00","dateModified":"2024-06-26T05:43:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/"},"wordCount":879,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/RT_Threat_Analsysis-e1625780646867.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/","name":"REvil Ransomware Uses DLL Sideloading | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/RT_Threat_Analsysis-e1625780646867.jpg","datePublished":"2021-07-16T16:49:41+00:00","dateModified":"2024-06-26T05:43:08+00:00","description":"This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/RT_Threat_Analsysis-e1625780646867.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/RT_Threat_Analsysis-e1625780646867.jpg","width":600,"height":314},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/revil-ransomware-uses-dll-sideloading\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"REvil Ransomware Uses DLL Sideloading"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/124778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=124778"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/124778\/revisions"}],"predecessor-version":[{"id":195308,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/124778\/revisions\/195308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/124633"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=124778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=124778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=124778"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=124778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}