The Blue Report 2024
Get a comprehensive analysis of over 136 million cyber attacks and understand the state of threat exposure management.
H0lyGh0st is a North Korea-based threat actor group, and they have been actively using and developing malware in the wild since June 2021. Like other ransomware groups, H0lyGh0st is a cyber extortion group with financial motives and objectives. In September 2021, they launched successful attacks on many small-to-midsize industries like banks, manufacturers, schools, and event and meeting planning organizations worldwide [1]. Even though H0lyGh0st is not a new threat actor, the group started using a new, improved, and more persistent variant in April 2022. This blog explained what the H0lyGh0st group has improved regarding its TTPs (Tactics, Techniques, and Procedures).
Picus Labs added attack simulations for H0lyGh0st ransomware attacks to the Picus Threat Library, and you can test your security controls against H0lyGh0st attacks.
Simulate Ransomware Threats with 14-Day Free Trial of Picus Platform
The H0lyGh0st Extortion Group
The H0lyGh0st is a North Korea-based cyber extortion threat group known for developing malware payloads and performing ransomware attacks since June 2021. The ransomware group is also known as HolyGhost and DEV-0530. In September 2021, they launched many successful attacks. Victim statistics show that they mainly target small-to-midsize industries like financial services, manufacturing, education, and entertainment organizations with weak security infrastructures [1].
Figure 1: H0lyGh0st group's welcoming message on their web page [1]
The group hosts a .onion web page to maintain communication with their victims. On their homepage, they rationalize their cyberattacks and malicious actions by claiming to be "Robin Hood" however, the H0lyGh0st ransomware group does not target large organizations with robust security infrastructure. In fact, H0lyGh0st can be called an opportunistic threat group that preys on small businesses with a weak security posture.
Figure 2: Instructions given by H0lyGh0st on their web page. [1]
After gaining initial access to their victim's network, the threat actors move laterally across the network and exfiltrate sensitive data. After exfiltration, H0lyGh0st encrypts the victim's data and leaves the instructions for a ransom payment in Figure 2. The ransomware group uses the double extortion method and threatens to release stolen sensitive information on social media or anonymous document-sharing platforms like Pastebin unless ransom is paid.
Figure 3: An email sent by H0lyGh0st [1]
The threat actor sends a piece of stolen data back to their victim as proof and demands ransom for the decryption key. Demanded ransoms vary from 1.2 to 5 BTC. However, some victims were able to negotiate and make a discount of up to ⅓ of the initial ransom [2].
Affiliated APT Group - PLUTONIUM
According to Microsoft Threat Intelligence Center (MSTIC), H0lyGh0st is not following a hundred percent unique and independent approach from other ransomware groups. There are some overlapping points between H0lyGh0st and another North Korean-based APT group, PLUTONIUM.
PLUTONIUM is known as DarkSeoul or Andariel in the wild and is a sub-group under the Lazarus umbrella. PLUTONIUM is infamous for attacking energy and defense industries in many countries like South Korea, the USA, and India. The observed mail communications between PLUTONIUM and H0lyGh0st and the use of similar custom malware controllers indicate an affiliation between the two groups.
The first malware developed by the H0lyGh0st ransomware group was named BTLC_C.exe, and it was first observed back in Jun 2021. BTLC_C.exe is classified under the SiennaPurple malware family and was written in C++.
Shortly after, the threat group switched to the Go language and built new ransomware variants. These new variants, HolyRs.exe, HolyLock.exe, and BLTC.exe, are classified under the SiennaBlue malware family.
Since all these variants use the similar C2 URL and code patterns, ransom notes and instructions, MSTIC attributed these ransomware to H0lyGh0st aka DEV-0530.
Figure 4: Timeline of the Payloads Developed and Used by H0lyGh0st [1]
BTLC_C.exe Under the SiennaPurple Family
BTLC_C.exe is the first malware developed by the H0lyGh0st ransomware group. BTLC_C.exe is not a sophisticated malware payload and has few distinguishable features compared to its successors HolyRs.exe, HolyLock.exe, and BLTC.exe.
BLTC_C.exe requires administrator-level privileges for execution, otherwise, a hard-coded error message pops up saying that the program requires an admin user.
This malware uses a pretty basic string obfuscation technique: It substructs "0x30" from the hex value of each character in a string. For instance, the hard-coded C2 IP address, 193[.]56[.]29[.]123, of the main_ServerBaseURL: hxxp://193[.]56[.]29[.]123:8888 is encoded as "aic^ef^bi^abc0" [1]. Apart from that, it is seen that IoCs found in decoded malware are highly correlated to other variants in the SiennaBlue family in terms of C2 infrastructure and TTP beacon URL structure access.php?order=AccessRequest&cmn [1].
HolyRS.exe, HolyLock.exe, and BLTC.exe Under the SienneBlue Family
As it was mentioned previously, malware payloads under the SiennaBlue family are written in Go language; thus, they share core Go functions including multiple encryption options, public-key management, internet and intranet support, string obfuscation.
To gain initial access, new variants of H0lyGh0st ransomware search for vulnerabilities in the public-facing web applications and content management systems of their target. DotCMS RCE (CVE-2022-26352) vulnerability is one of the vulnerabilities exploited by the ransomware group.
After successfully encrypting the victim's files, the ransomware encodes the file names in Base64 and appends the file with the .h0lyenc extension. Then, the ransomware leaves a file called "FOR_DECRYPT.html" that contains contact information.
Figure 5: "Contact Us" Section on the H0lyGh0st Web Page [1]
The latest variant, BLTC.exe, has a hardcoded intranet URL and ServerBaseUrl in the malware. BLTC.exe can be configured to connect to a network share using the default credentials and the intranet URL if the victim device cannot reach the ServerBaseUrl. Unlike its predecessors, BLTC.exe establishes persistence by creating and deleting a scheduled task called lockertask.
After being executed with administrator privileges, the ransomware payload tries to connect to the ServerBaseUrl. If the connection is successful, it downloads a public key to the C2 server in order to encrypt the victim's all files.
How Picus Helps Simulate H0lyGh0st Attacks?
Using the Picus Continuous Security Validation Platform, you can test your security controls against the H0lyGh0st attacks. We advise you to simulate H0lyGh0st ransomware attacks and determine whether your security controls can prevent them or not. Picus Threat Library includes the following threats to simulate attacks and malicious tools used by the H0lyGh0st group.
Threat ID |
Action Name |
Attack Module |
20076 |
H0lyGh0st Ransomware Malware Download Threat |
Network Infiltration |
41450 |
H0lyGh0st Ransomware Malware Email Threat |
Email Infiltration (Phishing) |
97451 |
DEV-0530 Threat Group Campaign Malware Download Threat |
Network Infiltration |
75946 |
DEV-0530 Threat Group Campaign Malware Email Threat |
Email Infiltration (Phishing) |
MITRE ATT&CK Techniques Used by H0lyGh0st Group
Initial Access
T1133 External Remote Services
T1190 Exploit Public-Facing Application
Execution
T1059.003 Windows Command Shell
Persistence
T1133 External Remote Services
Privilege Escalation
T1134.001 Token Impersonation/Theft
Defense Evasion
T1027.002 Software Packing
T1134.001 Token Impersonation/Theft
Credential Access
T1056.004 Credential API Hooking
Discovery
T1012 Query Registry
T1033 System Owner/User Discovery
T1049 System Network Connections Discovery
T1057 Process Discovery
T1082 System Information Discovery
T1083 File and Directory Discovery
T1135 Network Share Discovery
Collection
T1056.004 Credential API Hooking
T1114 Email Collection
Command and Control
T1571 Non-Standard Port
T1573 Encrypted Channel
Impact
T1486 Data Encrypted for Impact
Indicators of Compromise (IOCs)
SHA-256 |
MD5 |
SHA-1 |
99fc54786a72f32fd44c7391c2171ca31e72ca52725c68e2dde94d04c286fccd |
54ca404d16db18d233c606b48c73d66f |
d7d472bfc62bd6f52e3b4b3c7e88b92b664dd142 |
f8fc2445a9814ca8cf48a979bff7f182d6538f4d1ff438cf259268e8b4b76f86 |
a2b371eea0aee7cf57e23b5f0f4668c7 |
d1ddbe96ef37c38b4d92bcba3d02bbb2e921ffdc |
bea866b327a2dc2aa104b7ad7307008919c06620771ec3715a059e675d9f40af |
eec15f3648f8bc8684e67ac7cf9813ea |
4dade34d55256981a446525bc98faa1abdc25118 |
Reference
[1] Microsoft Threat Intelligence Center (MSTIC) and Microsoft Digital Security Unit (DSU), “North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware,” Microsoft Security Blog, Jul. 14, 2022. [Online]. Available: https://www.microsoft.com/security/blog/2022/07/14/north-korean-threat-actor-targets-small-and-midsize-businesses-with-h0lygh0st-ransomware/. [Accessed: Jul. 27, 2022]
[2] H. Pro, “North Korean hacker group targets victims globally with Holy Ghost ransomware,” Hive Pro, Jul. 20, 2022. [Online]. Available: https://www.hivepro.com/north-korean-hacker-group-targets-victims-globally-with-holy-ghost-ransomware/. [Accessed: Jul. 27, 2022]