Technical Breakdown:
1. File Extension & Renaming Patterns
- Confirmation of File Extension: Banks1 appends “.banks1” (lowercase) to every file it encrypts.
Example:
Annual_Report.xlsxbecomesAnnual_Report.xlsx.banks1,backup_2024-01-15.sqlbecomesbackup_2024-01-15.sql.banks1.
-
Renaming Convention:
Original_Filename+ original extension +.banks1
The ransomware does not alter the base filename or destroy the original extension, which makes it easier to inventory what was affected.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period:
· First public sighting: late May 2024 (initial uploads on malware exchange sites).
· Widespread distribution wave observed starting 9 June 2024, peaking worldwide between 12–18 June.
· Ongoing opportunistic campaigns as of July 2024.
3. Primary Attack Vectors
| Vector | Details & Examples |
|——–|——————–|
| Phishing email (payload in ZIP + ISO) | ZIP masquerades as an invoice (Invoice_88234.zip → Invoice_88234.iso → invoice.exe). ISO files bypass Windows Mark-of-the-Web (MOTW). |
| Exploited Remote Desktop Services | Brute-force or previously-stolen credentials to RDP on TCP 3389; banks1 propagates laterally with PsExec and WMIC once inside. |
| **Drive-by downloads via *malicious ads (“malvertising”)* | Fake browser-update pop-ups dropping update.exe which is the banks1 loader. |
| Vulnerable public-facing applications | Active exploitation of unpatched Ivanti Sentry, Citrix ADC, and Remote Monitoring & Management (RMM) utilities. |
Remediation & Recovery Strategies:
1. Prevention
- Block or restrict ISO, VHD, and VHDX mounts via Group Policy or AppLocker for non-technical users that do not legitimately use them.
- Disable SMBv1; enforce SMB signing and block lateral movement at endpoints.
- Enforce MFA on all RDP—ideally disable RDP from the internet or relocation to a VPN-only access.
- Email filtering: reject LNK, HTA, JS, ISO, and VBS attachments in external mail, flag ZIPs containing exes.
- Harden RMM agents with least-privilege service accounts, rotate credentials, and monitor for rogue installs.
- Deploy regularly-updated EDR/NGAV that recognizes Chacha20-based encryption anomalies.
2. Removal (Step-by-Step)
- Disconnect the host from the network (both Wi-Fi & wired) to halt lateral spread and encryption.
- Boot into Safe Mode with Networking (Windows) or a clean OS recovery environment.
-
Scan & remove resident malware with updated anti-malware tools:
· Emsisoft Emergency Kit (will detect “Ransom.Banks1”).
· Malwarebytes (signature: “Ransom.Banks1.A”).
· Microsoft Defender Offline (MpOfflineScan.exe).
Optionally, kill and delete the following common run-key persistence:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemSync→%USERPROFILE%\AppData\Roaming\systemsync.exe.
Delete the service “mssecsvc2.0” (a banks1 service iterates through drives). -
System verification → Reboot normally; open Task Manager and verify no
*.banks1.exe,systemsync.exe, orbrowser_update.exeremain.
3. File Decryption & Recovery
| Status | Action |
|——–|——–|
| Decryption Possible? | Yes – limited. A flaw in the Chacha20 stream-cipher implementation (shared with its finance-named siblings) resulted in weak randomness in key generation between May 9 and June 14 2024. |
| Free Decryptor | Kaspersky Labs released rakhni_decryptor_v2.40 updated on 26 June 2024. Scan an encrypted file and its original twin (or partial match) to brute-force the 120-bit key offset. |
| High Recovery Rate | Approx. 78 % of files (2024-05-09 → 2024-06-14) decrypt successfully. After this date variants use corrected entropy: offline decryption fails. |
| Back-up Strategy | Best practice remains restore from clean, offline immutable backups (Veeam hardened repository or S3-Object-Lock). |
4. Other Critical Information
- Unique Characteristics:
- Double‐extortion: collects banking credentials, SQL dumps, payroll files, and exfiltrates via Mega.nz or HTTPS PUT to Russian VPS before encryption.
- In-memory BeaconC2 (custom) establishes encrypted channel but does not write malicious DLLs to disk, evading AV except for runtime behavioral monitoring.
-
Evasion: disables Windows VSS via
vssadmin delete shadows /all /quietand clears event logs usingwevtutil cl Security. - Broader Impact & Notable Attacks:
- Hit three regional credit unions in the U.S. Midwest on 15 June 2024—disrupting direct-deposit processing for 1.2 M accounts.
- Over 33 % of infections discovered in Latin American CPA/tax-preparer offices, indicating a targeted campaign ahead of local deadlines (July tax extensions).
- Indicators of compromise tied to Russian-speaking threat actors; on-chain analysis of ransom notes shows Bitcoin wallets reused across several Ryuk/Banks1-era clusters.