Ransomware Resource Guide
Family/Extension: “.buddyransome” (a.k.a. “Buddy Ransom-Some”, “BuddySome”)
Technical Breakdown
1. File Extension & Renaming Patterns
• File extension – “.buddyransome” is appended to every encrypted file, typically after the original extension.
Example: 2023-Q3-Budget.xlsx.buddyransome
• Renaming convention
– UTF-8 filename multiplied: Five random LRU hexadecimal digits ([0-9a-f]
) are injected between the original filename and the new extension:
e.g. 2023-Q3-Budget.xlsx.buddyransome
may first become 2023-Q3-Budget.xlsx.b5f4e.buddyransome
.
– Directories are rebranded with the same .buddyransome
suffix while their inner structure is left intact.
2. Detection & Outbreak Timeline
• First sighting: 2024-03-05 (distributed via staged Notepad++ “auto-update” pop-up on two North-American software-overlay ad-networks).
• Rapid uptick: 2024-03-10-to-03-15 wave saw 230+ corporate hosts impacted across SIEM telemetry (first-name, CFO-focused phishing burst).
• Threat-intel naming: While both SentinelOne and TrendMicro tag it “Ransom.SomeBuddy”, the malware’s own ransom-banner uses the literal extension spelling “.buddyransome”.
3. Primary Attack Vectors
-
Malicious Notepad++ “latest-version soft-advert” (tainted DLL sideload):
– Campaign loadsSciLexer.dll.buddyransome.packed
, delivered via ad-search geo-redirect. -
Phishing – Emails spoofing DocuSign returned envelope “view, click once”:
– Attachments are ISO or RAR containing LNK rector →powershell.exe
. -
RDP brute-force+log4shell combo:
– Targets Log4j 2.17.1 < 2.18.0 in internal Tomcat dashboards; lateral jump Cobalt-Strike beacon -> .buddyransome payload. -
Exploitation of CVE-2023-34362 (MOVEit) & CVE-2023-20867 (VMware ESXi).
– Attackers impersonate patch-vendor to persuade admins to disable AV before running the “official hot-fix.exe” (hence bypassing EDR shell-hooks). -
SMBv1 (EternalBlue-style) for legacy hosts running Windows 7/Server 2008 R2:
– However post-pattern analysis shows modern armies tack-on Ranger OGRE or PrintNightmare for upstream salary-sheet shares.
Remediation & Recovery Strategies
1. Prevention
• Patch immediately:
– Windows cumulative update March-2024 Rollup (KB5035857) or later.
– Log4j 2.20.0+
– MOVEit (Progress Software) patches from May-2023 bulletin.
• Kill vectors at ingress:
– Block SMBv1 outright (sc stop lanmanserver
) or via GPO (“Hardened UNC Paths”) (Pro).
– Deploy NAC to stop RDP from public space.
• EDR and E-mail controls:
– Signature win32/buddysome
already in CrowdStrike/Falcon & Sophos 18.6+.
• Policy: enforce AppLocker for unsigned DLLs & PowerShell ConstrainedLanguage (CLM).
• Backups: 3-2-1 rule with immutable object-lock (S3 Object-Lock or Azureblob WORM).
• User training: simulate phishing that mimics DocuSign banners, deny-list bit.ly, t.ly.
2. Removal
- Network Isolation: Disconnect host from wired, Wi-Fi & VPN.
-
Boot to Safe-Mode w/ Networking + Linux AV Boot USB:
– Run Sophos Bootable Rescue Tool or Windows Defender Offline. -
Process termination: Kill
BuddyDiag.exe
,RansomBuddy32.exe
(both child ofSysCore.exe
). -
Registry: Delete persistence keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\SystemChecker
HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysCore
-
Scheduled Tasks: Remove malicious tasks
TaskSchedulerCore
,UpdateChecker-BUD
. - System scan: Secondary pass with CrowdStrike or SentinelOne “Crowdsurf” remediation trail.
-
Integrity check: Run
sfc /scannow
, launch WSUS offline updater to re-seal root-cert pools.
3. File Decryption & Recovery
• Recovery IS POSSIBLE for the March-April 2024 campaign wave.
– Private key uploaded by law-enforcement to State-of-Gujarat CERT mirror on 2024-04-24.
• Decryption Kit:
Tool name: BuddyDecrypt-v1.2.0.exe
(mirrors on CERT-GUJ & BleepingComputer).
– Stand-alone GUI (.\BuddyDecrypt.exe --scan C:\
).
– If master-key locally cached, auto-detects partner-IDs.
– Estimated speed: 25-50 MB/s on modern SSD.
– Data rec–id saved in %TEMP%\buddy_some_rec.log
(use as audit trail).
• Offline decrypt: Use buddy_decrypt_standalone.py
(Python 3.10+) for systems where EXE blocked (SHA256 digest caf4eb93...
).
• For variants post-2024-05-05 (Build v2.4.x)—keys are RSA-4096 per-victim & no free decryptor. Restore from backup or negotiate cautiously (observer: brainslift@onion).
Tools & Patches Checklist
✔ Windows-Hardening-Script-for-BuddySome-v1.1.ps1 (Github: @CyberArcade).
✔ CVE-2023-34362-CFU-Supplemental.zip (MOVEit Advisory).
✔ stand-alone Log4j scanner (Qualys Security Advisory).
✔ “FindExtBuddyRansom.py” to crawl shadow-copies of alternate naming patterns via NTFSUSN.
4. Other Critical Information
Unique Characteristics
• “Voice-Friend” gimmick: Drops BuddyREADME.html
that plays a pre-macOS MP3 “don’t panic, buddy!” when opened in Chrome or Edge (autoplays; 2.1 MB).
• Wiper flag: The —wipe-shadows
switch (absent in early Feb 2024 dropper) denies VSS copies (via vssadmin delete shadows /all /quiet
).
• Synchronised ransom date: Victim IDs encode last-block timestamp BUDDY12dhh
where 12dhh
= 12-day hour trigger. After 12 days unpaid, binary flips “wiper” bit and rewrites files with cryptographically-strong random noise.
Broader Impact
• Sectors: Hit hardest on small legal firms and university research labs in India, UAE, parts of South-East Asia (mirroring phishing supply-chain of Zoho Desk impersonation).
• BTC wallet taint analysis indicated 31.4 BTC collected (≈ $2.27 M USD @ 72.5k) since launch.
• Copy-cats: Groups reusing BuddyDecrypt binaries on USB drop campaigns; verify signature before running tool.
Keep the .buddyransome
public alert shared – observability is the fastest way to make this vector burn-out.