Community Resource – Ransomware Profile: ‑anti-us
Last updated: 07-May-2024
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: The ransomware appends “.anti-us” (leading dot) directly to the last portion of the original filename; e.g.
Annual_Report.xlsxbecomesAnnual_Report.xlsx.anti-us. -
Renaming Convention: In addition to the extension, the malware overwrites the file-icon registry entries so any file whose name ends in
.anti-uswill display a generic lock icon. Folder names are left untouched, but every directory (including root drives) receives a ransom note namedreadd_me.txt.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First samples appeared on underground marketplaces in late October 2023; large-scale financial-sector campaigns were observed between 18-Nov-2023 and 02-Jan-2024. A second wave began March 2024 targeting healthcare and manufacturing via Google Ad-served fake software installers.
3. Primary Attack Vectors
- Propagation Mechanisms:
-
Exploitation of Vulnerabilities
- ProxyNotShell (CVE-2022-41040 / CVE-2022-41082) – leveraged to drop Cobalt Strike → anti-us payload.
- FortiOS SSL-VPN heap-overflow (CVE-2022-42475) – automatic drive-by downloader (Linux loader).
-
Phishing & Malvertising
- E-mails themed “UPS Shipment Correction” deliver ISO or IMG archives containing
ChromeSetup.exe, which sideloadsSysWOW64\msvcr80.dll→ anti-us dropper. - Google Ads impersonating “Adobe Acrobat Pro 2024 Crack” redirect to sites serving MSI packages that chain-install the ransomware.
- E-mails themed “UPS Shipment Correction” deliver ISO or IMG archives containing
-
RDP & SMB Abuse
- Brute-forcing open RDP (TCP 3389) followed by manual activation of loader script
winTaskMgr.bat. - Port-scans for exposed SMB (TCP 445) then EternalBlue metasploit module for lateral movement once inside.
- Brute-forcing open RDP (TCP 3389) followed by manual activation of loader script
Remediation & Recovery Strategies
1. Prevention
- Proactive Measures – Prioritized:
- Immediately patch Exchange, FortiOS, and disable SMBv1 via Group Policy or registry (
HKLM\SYSTEM\…\LanmanServer\Parameters\SMB1 = 0). - Enforce RDP Network-Level-Authentication (NLA) and require complex MFA (Duo/Okta).
- Restrict Outlook from opening ISO/IMG files by default via Group Policy:
User Config → Admin Templates → Windows Components → Attachment Manager. - Deploy AppLocker / Windows Defender Application Control (WDAC) to block execution of unsigned binaries in
%USERPROFILE%\Downloads,%TEMP%, andC:\Users\Public. - Offline backups – follow 3-2-1 rule, rotated daily; test monthly restore and store at least one copy immutable (e.g., WORM S3 or ExaGrid Retention-Lock).
2. Removal
- Infection Cleanup – Step-by-Step:
- Disconnect the host from all networks (disable Wi-Fi, unplug Ethernet).
- Boot into Windows Safe-Mode w/ Networking or WinPE external USB.
- Run Microsoft Defender Offline Scan and ESET Online Scanner; both recognise the prevalent
anti-us loader.exe(Sig:Ransom.AntiUS.A) and will also collect fileless registry entries. - Delete persistence artefacts (scheduled tasks named
NVDisplayUpdateandOneDriveSync) viaautoruns64.exeor command line:
schtasks /Delete /TN "NVDisplayUpdate" /F - Remove the dropped Visual C++ redistributable proxy (
%WINDIR%\System32\msvcr80_nomkl.dll) and the staging folder%ProgramData%\AdobeARMService\. - Reboot normally and re-run full scan to confirm termination.
3. File Decryption & Recovery
- Recovery Feasibility: At the time of writing NO functional decryptor exists. The malware generates a Curve25519 key pair locally, encrypts the private key with a second, attacker-held public key, and then destroys the local private key remnant.
- Exploits/Keys released? – None thus far.
- Alternative Options:
- Restore from valid backup once infection is eradicated.
-
File-versioning / shadow-copy – anti-us runs
vssadmin delete shadows /all, but some endpoints still retain System Restore Points (checkvssadmin list shadows). -
Recovery utility:
ShadowExplorer(shadow copies), orPhotoRecif backups unavailable.
-
Essential Tools/Patches:
• Exchange Emergency Mitigation (EOM) Tool – auto-creates URLRewrite rules against ProxyNotShell.
• FortiOS firmware 7.2.4 + or 7.0.11+.
• Disable SMBv1 via HardeningKitty or Windows Security Baselines.
4. Other Critical Information
-
Unique Characteristics:
– anti-us contains a built-in worm module (wncsvc.dll) that enumerates network shares and encrypts mapped drives with a 256-thread pool, resulting in near-instant data saturation.
– Victims’ geo-location is checked viafreemyip.combefore encryption; systems in CIS countries (Russia/Belarus) are exempt and simply exit without payload detonation.
– Drops an MSBuild project file (build.antus.msbuildproj) that rebuilds itself on every reboot until removal, acting as a resilient dropper. - Broader Impact: A Texas-based MSP reported 6 customers (≈2 300 hosts) encrypted in under 45 minutes through one compromised FortiGate, illustrating speed potential. Law-enforcement (FBI Flash Alert #MU-000134) links operators to the MoShen threat cluster historically specialising in Qilin and Rorschach code reuse. Weekly ransom demands fluctuate from $150 k to $650 k (monero-based), with a 5-day leak-site countdown if payment fails.
Stay vigilant, keep systems patched, and verify backups regularly.