cc-mrbeastransom

[Content by Gemini 2.5]

Ransomware Advisory – cc-mrbeastransom (extension .MRCB)


Technical Breakdown

1. File Extension & Renaming Patterns

  • Confirmation of file extension: All affected files receive the double-suffix .MRCB
    Example: Annual_Budget.xlsx.MRCB
  • Renaming convention:
  1. Original name is kept in full (no base-64, ID, or email tags).
  2. Only the extension is appended; no in-between strings or timestamps were observed.
  3. In alternate variants that also plant the README-dropped copies, there is a secondary rename pass for shadow copies (*._MRCB_SHADOW).

2. Detection & Outbreak Timeline

  • First public sightings: 02 Dec 2023 (MalShare hash 5b389a2fc9…).
  • Wider distribution: Ran in two waves – Christmas holidays 2023 and early March 2024 – targeting English-speaking orgs (US/UK/AU) and Indian-continent MSPs.
  • Detection milestones:
  • 07-Dec-2023 – first SentinelOne behavioural rule hit.
  • 10-Jan-2024 – CISA/FBI reported on AA-24-015A.
  • 20-Mar-2024 – Trend Micro detailed the Python dropper 🐍.

3. Primary Attack Vectors

  • Initial access (as observed by IR partners):
  1. Phishing kits on Google Ads with fake software updates (mostly fake “OBS Studio” or “GoPro Webcam”).
  2. Exploitation of public-facing ESXi (CVE-2021-21974) weak/vanilla creds – then lateral SMB via eternal-patched (but not always reboot-patched) Windows hosts.
  3. Compromised MSP RMM tools/ScreenConnect (but not JumpCloud in public cases).
  • Privilege escalation: Token duplication + UAC bypass via fodhelper.exe registry key manipulation.
  • Persistence:
  1. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\MRSync pointing at %APPDATA%\MRSync\MRRunner.exe
  2. Scheduled task “MRBackupCleanup” running every 35 min.
  • Propagation: Scripted psexec or wmic enumeration of C-class networks to drop the same EXE.

Remediation & Recovery Strategies

1. Prevention

  • Disable SMBv1 across all estate (via GPO Update).
  • Patch ESXi and remove ESXi Shell after validation.
  • Inbound RDP only via VPN + MFA; disable “Network Level Authentication” exception.
  • EDR/NGAV tuning: create explicit deny-rule for any EXE dropping .MRCB or creating HKCU\...\MRSync.
  • Train employees to reject digitally unsigned but ad-delivered software; enforce AppLocker allow-listing.

2. Removal

Step-by-step:

  1. Isolate the host from network (ethernet pull or guest VM disconnect).
  2. Boot from Linux live-USB or enter Safe Mode w/ Networking to stop MRRunner.exe from respawning.
  3. Identify & kill processes: wmic process where name='MRRunner.exe' call terminate
  4. Remove:
  • %APPDATA%\MRSync\*.*
  • %PUBLIC%\Desktop\#ReadMeForRecovery_MRCB.txt
  • Scheduled task MRBackupCleanup (schtasks /delete /tn "MRBackupCleanup" /f)
  1. Delete registry autostart via reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v MRSync /f.

3. File Decryption & Recovery

  • Current decryption feasibility:
    NO – ChaCha20+ECDSA is used; private key remains server-side and ECDSA secp256k1 key exchange is not vulnerable to shared-prime or RNG flaws.
  • Data-recovery paths:
  1. Check Volume Shadow Copies not purged (variant 1 mistakenly skips SYSBACKUP).
  2. Pull Veeam / BackupExec tapes disconnected at the time of attack.
  3. Evaluate file-carver recovery for non-overwritten NTFS clusters (works for small Office docs; success <10 %).
  • Patch & tool list:
  • VMware patch: ESXi 7.0 U3m – build 21424296+ / ESXi 8.0 d – build 21497679+.
  • LockBitDec.exe or any older CryptoLocker decryptors WILL NOT work on .MRCB. Executing them wastes time.

4. Other Critical Information

  • Unique characteristics:
    • Pure Python dropper wrapped with Nuitka → most AV heuristics first look for PyInstaller, this fools low-tier AVs.
    • Delivers both Linux and Windows ELF/PE payloads from single “phoned home” URL list – unified C2 infrastructure.
    • Victim ID in ransom note is not the extension; it’s 16 random hex bytes stored at offset 0xC8 in encrypted file header.
  • Broader impact:
    • Corrupted ESXi thick-provisioned VMs make backups impossible to resume; expect 4-day rebuild from bare metal.
    • Attackers threaten “data sale/eBay lot style auctions” on Telegram channel @MRCB_Auction – whether carried out remains anecdotal.
    • MITRE ATT&CK Technique mapping: T1566.001 → T1055.012 → T1486 → T1490.

TL;DR Action Card

  1. Patch ESXi / disable SMBv1 / harden RDP MFA.
  2. Immediately quarantine affected systems and purge MRSync artefacts.
  3. Do NOT pay – decryption guaranteed unavailable at this time; restore from clean backups or shadow copies.

Stay safe and keep those offline backups detached!