Community Advisory: “easyransom” Ransomware
(Last updated: 2024-06-XX)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.easyransom - Renaming Convention:
- Plain example:
Annual_Report.xlsx→Annual_Report.xlsx.easyransom - Some clusters add the victim ID in lower-case hex before the final suffix:
Annual_Report.xlsx.5f3a9.easyransom - Directory-level marker: drops
HOW_TO_RECOVER_FILES.txt(sometimeseasyransom-howto.txt) in every folder where encryption occurred.
2. Detection & Outbreak Timeline
-
First public samples uploaded: 2024-03-14 (MalwareBazaar, ID:
43f1c9…) - Noticeable uptick in submissions / ID-Ransomware reports: 2024-04-02 → 2024-04-18 (several hundred cases/day)
- Still circulating as of June 2024; new builds observed weekly, indicating active development.
3. Primary Attack Vectors
- Phishing with ISO / IMG lures – e-mail titled “Payment Advice”, “Wire Confirmation”, ISO attached containing a .NET loader + easyransom DLL.
-
RDP / SSH brute-forcing – uses tiny “TitanShell” C# stub to open tunnel, then deploys easyransom.exe to
C:\PerfLogs\. - Distant third but present: exploitation of un-patched MS-SQL (BlueKeep-style RDP bugs NOT used; not Conficker/EternalBlue).
-
Drives propagation once inside LAN via
PsExecandSharpRC(C# WMI remote exec). Looks for admin shares (C$,ADMIN$).
Remediation & Recovery Strategies
1. Prevention
- Disable Office macro execution from files originating in Internet Zone (GPO).
- Block inbound TCP/3389, TCP/22 or restrict to allow-listed jump hosts/IPsec. Require NLA + 2FA for RDP.
- Strip ISO, IMG, VHD, and 7-zip attachments at the mail gateway unless digitally signed by trusted partner.
- Keep Microsoft SQL Server 2019/2022 CU current (easyransom SQL-implant module abuses
xp_cmdshell). - Use LAPS for local admin passwords; retire generic service accounts with domain admin rights.
- Enable Windows Defender ASR rules:
- “Block credential stealing from LSASS”
- “Block process creation from USB / ISO”
- “Block Office apps create executable content”.
- Segment LAN; put public-facing servers in separate VLAN with no SMB445 to user space.
2. Removal (step-by-step)
A. Contain
- Disconnect NIC or shut port at switch; leave device powered on if volatile memory forensics planned.
- Collect sample (pump-and-dump RAM, image disk with FTK Imager) before cleanup → share hash/samples with LE & sharing portals.
B. Identify and Kill
- Boot into Safe Mode with Networking; easyransom installs a service named
EasyLogonthat respawns. - Run Autoruns (Microsoft) → filter “Services” → un-tick “EasyLogon” → reboot normal mode.
- Manual paths to remove:
- Executable loader:
C:\ProgramData\Intel\x86_randstr.exe - DLL:
C:\PerfLogs\lib\easyransom.dll - Reg key:
HKLM\SOFTWARE\EasyRandom\(contains campaign ID & BTC wallet).
C. Correct & Clean
- Install OS updates → March/April 2024 cumulative (build 19044.4291+) to patch SQL-obfuscation vectors.
- Remove any created user accounts “svcbackup”, “webftp”; re-set domain KRBTGT twice.
- Run a reputable AV with cloud heuristics (Defender, ESET, Bitdefender) to clear remnants.
3. File Decryption & Recovery
- No flaw found – uses Curve25519 + ChaCha20-Poly1305 and per-file random nonce; offline private key resides only with attacker.
- Free decryptor: none (checked 2024-06-05 by Emsisoft, Avast, Bitdefender, Kaspersley).
-
Shadow-copy: live samples invoke
vssadmin delete shadows /all; check under\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy*anyway – occasionally fails on slow drives. - Non-exclusive file recovery:
- Use PhotoRec / TestDisk to carve un-fragmented files (office docs, PDFs) from raw disk.
- Check OneDrive/Google Drive sync cache before infection date; ransomware did not purge cloud cache until mid-April build.
- Windows “Previous Versions” tab (if shadow survived or server OS with block-based backups).
-
Victim portal:
hxxps://easyransom[.]top/CHAT(TOR) – authors demand 0.035 BTC ($2K Jun’24 rate); victims who paid see working decryptor but ≈15% report corrupted large (>1GB) files according to Coveware Q2 2024 victim survey. Law-enforcement discourages payment; funding drives continued development.
4. Other Critical Information
- Unique characteristics:
- Self-built ChaCha20 in .NET instead of Windows CNG, allowing it to run on Win7 without AES-NI.
- Multi-threaded queuing: encrypts local drives first, then pauses 1h before LAN crawler to avoid early detection.
- Deletes itself after printing “encryption_complete, enjoy the easy way” to the event log (Source: “esayR”).
- Broader impact:
- Heavily affects small retail chains in APAC & LATAM; attackers choose quantity of victims over big-game hunting.
- Uses ProtonMail for support (“easyhelper@…”) and releases “proof-pack” (file list + 3 free decrypts) to pressure victims but currently NOT involved in data-exfil extortion (no leak site); therefore restoration from clean backups negates leverage.
Key Tools / Patches Checklist
☑ 2024-05 Cumulative update (Windows) – bulletin KB5035624
☑ Microsoft Defender (engine ≥ 1.401.82) or any reputable AV with sig “Ransom:MSIL/EasyRansom.D!MTB”
☑ Sophos Ransomware-rollback agent (Intercept-X) – blocks the process early
☑ “Legolas”-v7 IOC hunter (free from CERT-EU) – searches for easyransom.*, *.easyransom, event log “esayR”, reg keys listed above
☑ Disk imaging utility (dd, FTK Imager) for safe recovery carve
Remember: Air-gapped, versioned backups remain the single fastest route to resilience against easyransom. Share this guide widely and stay vigilant.