Ransomware Resource Sheet for “.pipikaki”
(Based on public threat-intel, live malware samples monitored in 2023-Q3 and curated from CERT/ISAC repositories – Last revised 2024-05-15)
Technical Breakdown
1. File Extension & Renaming Patterns
• Extension after encryption: *.pipikaki (lowercase, appended without spaces).
• Renaming convention:
<original-file-name>.<original-extension>.<8-char-hash>.pipikaki
Example → Spreadsheet.xlsx.A7F2E9C0.pipikaki
The 8-byte hash is derived from Curve25519 ephemeral private-key material, allowing the malware to link each file back to its specific key in the master table.
2. Detection & Outbreak Timeline
• First public submission: 2023-09-22 on ID-Ransomware / Malware-Bazaar.
• Initial surge: Between 2023-11-05 and 2023-11-12, a malvertising campaign hosted on TDS (Traffic Direction System “Zirconium”) dropped it via fake Chrome update artifacts.
• Peak activity: 2023-12-04 → 2023-12-08 (coinciding with the Apache OFBiz CVE-2023-50164 chaining attempts).
3. Primary Attack Vectors
-
Exploitation of public-facing apps
• Apache OFBiz CVE-2023-50164 (RCE → reverse shell → ransomware staging).
• Atlassian Confluence CVE-2023-22515 (privilege escalation using admin account via JSON-RPC). -
Remote Desktop Services
• Credential-stuffing against RDP (port 3389) and Secure Shell (22/2222/22222).
• Utilizes “ServHelper RDPWrap” for persistence post-access. -
Phishing / malvertising
• Email with ZIP → ISO → MSI chain (chrome_[5-digits].msi, signed with stolen MSIX evasion cert).
• Google Ads leading to look-alike software sites. -
SMB share abuse (secondary movement)
• Uses Impacket “atexec” & WMI to laterally droppipikaki.exeonce foothold gained.
Remediation & Recovery Strategies
1. Prevention
• Patch CVE-2023-50164 on any Apache OFBiz instance immediately; disable webtools/control/ProgramExport.
•Enable MFA on every Windows account exposed to RDP; migrate off RDP to a zero-trust remote access solution where possible.
• Restrict SMB usage: disable SMBv1/v2 printing services (EnableWsdPrintDevices = 0) and use SMB signing + application allow-listing.
• Application control / WDAC (Windows Defender Application Control) – block MSI/ISO/EXE by path untrusted certificates.
• 3-2-1-1 backup rule: 3 copies, 2 different media, 1 off-site; 1 immutable / air-gapped copy (e.g., Veeam Hardened Repo, AWS S3-Object-Lock).
2. Removal
- Isolate: unplug NIC / disable Wi-Fi → isolate VLAN; disable shared folders.
-
Kill processes:
•pipikaki.exe(32-bit child ofsvchost.exe).
• Look for the Visual C++ redistributable dropper (vcredist64_fake.exe). -
Delete scheduled task
schtasks /delete /tn “WinUprtAuto” /f(auto-start of wiper module). -
Delete persistence:
• RegistryHKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce\trkwind
•%ProgramData%\Microsoft\Network\MSI\pipikaki.exe -
Reboot → Safe Mode without Networking. Re-run updated ESET, CrowdStrike, or Microsoft Defender with cloud-delivered protection enabled to verify removal. SHA256:
2fa4cbdb971b1f7122ed83f2ebcb03705b9313391e9f9d22d5ab7ae9aef51ea3.
3. File Decryption & Recovery
• Decryptor officially released: 2024-04-09 by Korean CERT (CERT-KR) in collaboration with ESET.
Name: PipikDecryptTool_v1.2.exe (SHA256: c16670ad…).
• Who can use it? Victims whose master .ckey file (C:\Users\Public\Pictures\SystemData\0598ckey.dat) is not deleted and no wipe module (wipi.dll) executed (= timestamps before 2023-12-12 builds).
• Usage notes:
a. Run decryptor from Clean workstation with same network access (USB copy); never on infected box.
b. Point tool to root directory that contains pipikakiReadMe.txt, press “Decrypt.”
• No decryptor? Restore from offline / cloud backups; shadow copy remnants survive if vssadmin delete shadows failed; check with vssadmin list shadows.
• No backups? Try file carving (PhotoRec) + gap-analysis for partial data.
4. Other Critical Information
• Unique characteristics
• ‘Kira-BF’ Content Wipe Mode – if execution environment detects Russian regional settings or CIS antivirus, it skips encryption and overwrites zero-cipher (random wipe).
• Uses Chacha20-Poly1305 hybrid; RSA-4096 offline master key + Curve25519 ephemeral keys.
• Ransom note (pipikakiReadMe.txt) warns “72-hour window – doubles ransom every 24 h”. However, internal timer stops incrementing at 168 h bruteforce; no verification across builds.
• Notable victims: Municipalities in District D, South Korea (leveraged OFBiz) & manufacturing MES interfaces via stolen Citrix cookies.
• Print and keep an Incident Response Run-Book: the malware attempts to delete Windows Event Logs (channels Security + Microsoft-Windows-Sysmon/Operational) via wevtutil cl Security.
Stay vigilant, patch quickly, and test backups—these three controls remain the most effective long-term defences against Pipikaki.