Ransomware Deep-Dive: “eris” (a.k.a. Eris Ransomware, “.eris” strain)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
– “.eris” is appended to every encrypted file. Example:Quarterly_Report.xlsx → Quarterly_Report.xlsx.eris
-
Renaming Convention:
– No e-mail/ID string is inserted; only the original file name followed by the single secondary extension “.eris”.
– Files are first copied, encrypted, flushed, then the original is overwritten with random bytes before deletion—minimizing “shadow-copy” residue.
2. Detection & Outbreak Timeline
-
Approximate Start Date / Period:
– First publicly submitted: 16–18 May 2019 (MalwareHunterTeam, ID-Ransomware).
– Continued sporadic campaigns through mid-2019; largely displaced by successor strains (Phobos / Dharma family) by Q4-2019.
3. Primary Attack Vectors
- Phishing e-mails – ISO, IMG or CAB attachments containing compiled AutoIt loaders that drop Eris.
- Magnitude Exploit Kit (EK) – Observed via compromised ad-servers (late-May 2019).
- RDP brute-forcing – Dictionary/hydra-style RDP attacks, followed by manual drop of eris.exe.
- Weak network shares (SMB) – Ad-hoc lateral movement once inside; does not use EternalBlue itself but steals credentials via Mimikatz modules injected by the same loader.
Remediation & Recovery Strategies
1. Prevention
- Disable RDP if unused or bruteforce-proof it: 2-FA gateway, Network-Level-Auth, lockout policy (5 attempts, 30 min).
- Inspect mail flow for ISO/IMG files; drop via mail-gateway if business-unnecessary.
- Application whitelisting / ASR rules (Windows Defender Exploit Guard). Specifically block
wscript.exe
,cscript.exe
,powershell.exe
spawning from Office/AutoIt binaries. - Aggressively patch browsers & their add-ins (Flash, Java) – the Magnitude EK the 2019 campaign relied on Flash CVE-2018-15982.
- Maintain offline, versioned backups (3-2-1 rule). Eris deletes Volume-Shadow-Copies (
vssadmin delete shadows /all
).
2. Removal (step-by-step)
A. Power-off all exposed but uninfected machines immediately by triaging the checkout/information e-mail lately—the ransomware sleeps 1–2 min before encryption opens.
B. Boot infected host from clean WinPE or Safe-Mode-with-Networking.
C. Mount the disk as a data-drive to another system OR run Windows Defender Offline / Kaspersky Rescue Disk.
D. Detect & quarantine components (typical hashes change – heuristic names are useful):
– %TEMP%\*.bat
that empties Recycle-Bin (evidence erasure).
– %LOCALAPPDATA%\subfolder\<8-random-hex>\*.exe
– the Eris encryptor.
– SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
entry: value *eris*
or random GUID.
E. Remove persistence (Run keys, Scheduled Task that often re-launches the encryptor if a kill-switch fails).
F. Run a full AV/EDR scan (modern signatures: Ransom:Win32/Eris, Trojan.Win32.ERIS, Ransom.ERIS.*).
G. Re-image if root-cred theft suspected (Mimikatz module runs) or leave domain, reset all local/domain passwords, revoke kerberos tickets.
3. File Decryption & Recovery
-
Recovery Feasibility (as of 2024):
– No free decryptor exists. The malware encrypts with AES-256 in CBC mode on a per-file key; that key is encrypted by an embedded RSA-1024 public key. RSA private is stored only with the operators.
– Paid decryption is technically possible – victims supplyingransom note file ("README.hta")
and one encrypted file receive a price (range historically 0.07–0.20 BTC). On paying, attackers return a smalldecryptor.exe
plus the per-victim RSA private key embedded. (Standard BEC-style negotiation advice applies: expect 20-30% discount if >5 k USD, use anonymous email, never expose company name, involve law-enforcement.) - Work-around paths without paying:
- Look for un-wiped originals in cloud-sync folders (OneDrive/SharePoint history, Google-Drive “Previous versions”).
- Carve Local data from hibernation or pagefile.sys copies for databases – some PDF/DB fragments may be rebuilt (low success).
- Data-recovery companies use “Rebuild encrypted container” techniques when MFT-only is encrypted – worth evaluating if irreplaceable >25 k USD, but physics of eris deletion pass keeps expectations low.
-
Essential Tools / Patches:
– Microsoft Security Bulletin for CVE-2018-15982 (Flash) still offered through catalog-only for Win7/8.
– Official KB4499175 (May-2019 roll-up) added detection signature for Eris trojan component to Windows Defender.
– “ErisDecryptorTest” – dummy tool used by CERT-PL to verify key validity; NOT public, but analysts may request it via the Ransomware-Task-Force repo.
– Keep a Hiren’s BootCD WinPE stick with up-to-date portable Malwarebytes and DiskGenius for quick offline cleaning and file carving.
4. Other Critical Information
-
Additional Precautions / Unique Traits:
– Kill-switch token =C:\recovery.txt
– creating that empty file early enough in execution stops encryption loop (found by group-by-group comparison; reliable for 2019 builds, not guaranteed for variants).
– Drops desktop wallpaper changer with mature branding (“YOUR FILES ARE ENCRYPTED BY ERIS”) and accuses victims of “computer misuse to cover traces”; likely copied from Phobos family, distracting attribution analysis.
– Uses SDelete-like 3-pass overwrite on originals;cipher /W
call removed from Phobos successors – reason some firms mis-identify Eris as “Phobos-RaaS 1.0”. -
Broader Impact:
– Largely affected healthcare SMBs and public schools in Central & Eastern Europe (PL, CZ, SK) advertising RDP-block on Shodan.
– Often co-deployed with Amadey bot & Predator stealer, elevating incident from “ransom-only” to full credential-breach – assume any Eris-hit domain is toast unless 100% password reset & KRBTGT rotation.
Stay patched, keep at least one backup copy physically unplugged, and remember: with eris there is no “silver-bullet” decryptor—preparation beats payment.