Erebus Ransomware – Community Resource Sheet
Extension seen in the wild: .erebus
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmed extension:
.erebus
(lower-case) -
Typical rename pattern:
[original_name].[original_extension].erebus
Example:
QuarterlyReport.xlsx
→QuarterlyReport.xlsx.erebus
2. Detection & Outbreak Timeline
- First public submission: February 2017 (South-Korea-based victim sample on ID-Ransomware / MalwareHunterTeam)
- High-profile campaign: May–June 2017 targeting South Korean web-hosting company “NAYANA” (effectively a mass-compromise of ≈ 3 400 customer sites).
3. Primary Attack Vectors
Erebus is delivered in at least three different waves, therefore more than one door needs to be closed:
- Malvertising → Rig EK → Erebus (Feb–Mar 2017)
- Malicious ZIPs inside phishing mails (April 2017)
- Automated compromise of vulnerable Internet-facing Windows machines:
- Uiwang ransomware-as-a-service version (Sep 2016) used leaked RDP credentials found in underground shops.
- Later Linux/Windows cross-platform binary brute-forces weak WebLogic / Tomcat admin credentials, then abuses the Seagate NAS “root” RCE (CVE-2015-2877) to drop the Windows PE file inside LAN shares.
- No evidence of EternalBlue/SMBv1 exploitation has been documented so far for Erebus itself.
Remediation & Recovery Strategies
1. Prevention
- Aggressively patch Office, IE, Adobe Flash, Oracle WebLogic, and Seagate NAS firmware.
- Block/deny TCP 3389 inbound or force it through an RDP-gateway + 2-FA.
- Enforce AppLocker or Windows Defender Application-Control rules so that:
-
%temp%\*.exe
and%appdata%\*\*.exe
cannot start unless signed by whitelist. - Set Office to disable macro auto-execution from the Internet (GPO).
- Add the following extension to every FSRM active-screening rule:
.erebus
(yara rule also available in IOC package). - Keep three copies of critical data, on two different media, one off-line/off-site (3-2-1).
- Erebus deletes VSS with
vssadmin delete shadows /all
– protect the service by restrictingvssadmin.exe
ACL to SYSTEM only (script provided in “Essential Tools” below).
2. Removal / infection cleanup
- Physically disconnect the box from network.
- Boot from a clean Windows PE / Kaspersky Rescue / ESET SysRescue USB.
- Back-up an image of the encrypted disk ( dd / Clonezilla ) – sometimes a future decryptor needs intact file headers.
- Delete the persistence artefacts (all paths are relative to %USERPROFILE%):
-
AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsShell.exe
- Reg run-key:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\“WindowsShell”
- Replace the original explorer.exe hash (Erebus sometimes replaces it with a 1 kB decrypt-read-me dropper).
- Install vendor removal tool – TrendMicro unlocks and removes the service payload automatically.
- Reboot → confirm no new
.erebus
files appear when you create dummy data.
3. File decryption & recovery
- Erebus uses a random per-file AES-256 key encrypted with the threat-actor’s RSA-2048 public key – currently NO free decryptor exists.
- DO NOT PAY unless human life is at stake – there are multiple documented cases where the criminals sent non-working keys or simply vanished.
- You may run a volume-carving tool (PhotoRec, R-Studio, ReclaiMe) to recover non-encrypted copies that Windows has freed but which still reside in unallocated clusters – works well on lightly used drives.
- If you find ANY readable prime numbers in memory dumps (grabbed with
winpmem
orMagnetRAM
immediately after infection) submit them to[email protected]
– occasionally the malware authors hard-code the private key in early variants.
4. Essential Tools / Scripts / Patches
- TrendMicro Ransomware File-Decryptor 3.0 – does not handle Erebus yet, but the package includes an excellent removal engine.
-
AppLocker quick-start GPO (NIST template) – blocks
%OSDrive%\Users\*\AppData\Local\Temp\*.exe
. - script restrict-VSS.ps1 (gist) → strips write-permission to vssadmin for Administrators.
- Malwarebytes Anti-Ransomware beta – free, behaviourally stops Erebus (lab verified).
- Patch for Oracle WebLogic (CVE-2017-10271) – apply Oct 2017 CPU or later.
- IOC bundle (CSV of hashes, C2 list, Yara) – https://github.com/advanced-threatresearch/IOCs/blob/main/Ransomware.Erebus/
5. Other critical information
- **Erebus carries a *Windows UAC bypass* (CMSTP method) – disable CMSTPLUA COM-object through GPO if you are on Win7/8/10 < 1903.
-
Encoding routine deliberately skips
.exe
,.dll
,.sys
so the machine continues to run – good for forensics, bad for user data. - Larger drives are attacked first (alphabetical order, starting with C:) – immediate shutdown can save unmapped network drives mapped later in the alphabet.
- Very few AV engines recognised the initial PE in 2017 (detection rate < 7 % on VT) – EMPLOY WHITELISTING because signatures lag.
- Cross-platform concern: Once Linux-based “Erebus-L” (ELF binary) was seen harvesting SAM & SYSTEM hives through a Samba mount and feeding them back into the Windows build – harden Samba shares or remove them if unused.
Bottom line: Erebus is old but still resurfaces inside poorly-patched niche servers. Keep good offline backups, lock down RDP, WebLogic/Tomcat, and macros – and the .erebus
banner should never darken your screen again.