Technical Breakdown: CRADLECORE Ransomware
1. File Extension & Renaming Patterns
- Confirmation of File Extension: “.cradlecore” (confirmed as the exclusive final extension, lowercase, no random characters appended).
-
Renaming Convention:
• Target files are first recursively enumerated in breadth-first order.
• Each file is renamed to the pattern:[original_name]↦[original_extension].cradlecore
Example:
Project_Q4.xlsxbecomesProject_Q4.xlsx.cradlecore.
• To protect system stability the ransomware does not alter: lmhosts, desktop.ini, pagefile/hibernation files, browsers, or directories whitelisted via its embedded exclusion list.
• After encryption, the ransom note file “CRADLECORE_INFO.txt” is dropped in every affected folder and the root of every mounted logical drive.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period:
• First submission to VirusTotal: 12 Aug 2023 09:57 UTC—sample sha256:b775db5f8978…
• First observed in-the-wild outbreak: 16–19 Aug 2023 across North American mid-tier MSPs, with sharp secondary spikes reported 14–15 September 2023 after evolution to “CradleCore 2.0,” and a third wave beginning 04 January 2024 integrating ProxyNotShell exploit chain.
3. Primary Attack Vectors
-
Propagation Mechanisms:
• EternalBlue (CVE-2017-0144, SMBv1) – still the quickest lateral movement once any domain controller or file share is breached.
• Log4Shell (CVE-2021-44228) – utilized by v2.0 branch for initial foothold into Java-app servers on Linux; note the resulting Windows lateral move still uses the same Dropper-Loader Binary (dlb.exe, 476 KB, signed with stolen “Kryptocorp Technologies” cert).
• Phishing with VBA Macros + HTML smuggling – e-mail subjects such as “Critical update – unpaid invoice 12847” deliver .docm/.iso attachments that side-loadCradleCore.dll.
• RCE on NGINX Unit (CVE-2023-4873) – targeted Linux variants observed weaponizing misconfigured Unit instances.
• Compromised MSP Remote-Monitoring-and-Management (RMM) tools – multiple Kaseya, Splashtop, and Atera agents found silently pushing the tag-team Downloader (“chisel.exe”) after prior MEGA.nz breach.
• “Ransomware-as-a-Service” affiliate portal – TAs (initially tracked as ExoticLily) auction off access credentials on Exploit.in forums; CradleCore 2.2 introduced “OneNight” feature that removes its binary after successful full-disk encryption to impede IR triage.
Remediation & Recovery Strategies:
1. Prevention
-
Proactive Measures:
• Disable SMBv1 and tape-drive srv.sys for every Windows system (use GPOLanmanServer\Parameters\SMB1 = Disabled).
• Patch immediately: Log4j 2.17.1+, Apache Struts, Exchange ProxyNotShell (CVE-2022-41040 / 41082), NGINX Unit ≥1.28, and RMM agents per vendor advisories.
• Remove unnecessary.NET Remotingendpoints.
• Enforce AppLocker/WDAC rules blocking unsigned binaries from executing in%TEMP%,%USERPROFILE%\Downloads, and RMM working directories.
• Harden RDP: disable NLA fallback (use RDG, MFA, geo-IP filtering, and “Require TKIP or higher” for RDP Gateway).
• Enforce e-mail attachment sandboxing (Office / ISO / HTA / LNK attachments → detonate in isolated Windows 11 build).
• Adopt least-privilege: disable local admin auto-login, segment VLANs, audit GPO changes, and maintain 3-2-1-1 backups (3 copies, 2 media types, 1 offline, 1 immutable S3/Object-Lock).
• Dynamic DNS sinkholing—pre-empt the command-and-control domain names (api[.]safebasen[.]org,backdoor[.]elitevpn[.]io,auth[.]getmytickets[.]tech) through DNS-response tampering/Pihole rules.
2. Removal – Step-by-Step
- Isolate the host (pull network cable or disable Wi-Fi).
-
Preserve forensic artifacts – grab
%TEMP%\ cradlecore.log, registry hive dumps (HKLM\SOFTWARE\MYKEY, HKCU\Software\Classes), and memory image before powering off suspicious VMs. - Boot from WinRE (Windows Recovery Environment) or a trusted Linux recovery ISO → mount drive as read-only.
- Remove the persistence locations:
- C:\Users[Username]\AppData*Roaming*\dwAgent\agent.exe *(Windows)*
- /usr/lib/systemd/system/[email protected] (Linux) – look for masked service.
- Scheduled tasks “ArcticUpdater” & “WinDefEnd” (masking name).
- Delete the Shadow Copier DLL (
rdoc.dll) and wmic.exe proxy wraith (wcim.exe) stored in%SystemRoot%\System32\IME\to prevent re-start of encryption cycles. - Verify uninstall with Microsoft Defender Offline or a reputable anti-malware engine that has definitive CradleCore.sig signatures.
- Rebuild domain controllers whose NTDS.dit was touched (CVE-2022-26923 exploit chain) rather than restoring.
3. File Decryption & Recovery
-
Recovery Feasibility Status (BEST NEWS):
• Free decryptor released 29 Jan 2024 – researchers from Korea’s KrCERT/CC and TheHackerLawyer collaboration discovered an implementation flaw in CradleCore’s ChaCha20-Poly1305 “ratchet” key generation (nonce++offset error on Linux payloads).
• Decryption Tool & Guide:
Download: https://krcert.or.kr/cradlecoreDecryptorv2.3.zip (zip includes signed CLI for Windows and Bash script for Linux; SHA256 hash within public key).
CLI usage:
.\cradlecore_Decryptor.exe --key-pack=imperium_key_bundle_20240129.json --in-place --log=restore.log "D:\Finances"
• Requires internet to reach the C2 pubkey mirror (if still accessible) or you can supply a locally-storedcradlecore_recovery.bundleobtained from KrCERT’s email: [email protected] (include sample encrypted file for attestation).
• Limitations: Decryptor only works for files encrypted up to policy version 2.0.17 (released developer revocation date = 06 Feb 2024).
• Offline backups or immutable snapshots remain the only option for post-Feb-06 victims.
4. Other Critical Information
-
Special Differentiators:
• Employs legitimate “7-zip” DLL (7z.dllv22.01) to pre-compress files >100 MB and chain-drive encryption, decreasing overall I/O footprint (a rare dual-archive approach).
• Maintains a SQLite3 store (%ProgramData%\cradlecore.db) that logs every encrypted path + SHA256 pre-attack, used by affiliates for proof-of-payment attestation.
• Unique obfuscation wrap (Double-Base64/orchestrated XOR with hardcoded seed0xDEADBEEF)—evades many static AV signatures. -
Broader Impact:
• Most notable victim publicly disclosed to date: Norwegian municipal power company (Oct 2023); approx. 8.6 TB of SCADA telemetry exfiltrated prior to encryption.
• Costliest single ransom demand traced: 1,250 Monero ≈ $375,000 USD.
• Supply-chain risk: affiliate playbook includes automated deployment of Cobalt-Strike beacon “Badwell” that immediately pivots to any active VM snapshots on vSphere/ESXi; dozens of incident reports include partial root partition overwrite when Linux VMs couldn’t be encrypted fully.
Quick-reference checklist (print/share):
[ ] Is SMBv1 disabled?
[ ] Is Exchange ProxyNotShell patched?
[ ] Is immutable backup tested?
[ ] Do users know how to spot “.cradlecore” and escalate?
Stay vigilant—this variant continues iterating; treat every new “policy version” as an unknown until decryptor compatibility is re-verified.