The global gaming phenomenon Fortnite has a huge global user base – last reported in March at 250 million gamers – and the just-concluded Fortnite World Cup with its $30 million prize pool and an online viewing audience of over two million has certainly only added to its allure. Over 40 million Fortnite gamers competed in qualifying rounds to get one of the 100 coveted spots in the World Cup and a guaranteed $50,000 payout, plus a shot at the $3 million top prize (won by a 16-year old!). Given the size of the global player pool and the evident motivation to up one’s game, it comes as no surprise that cybercriminals are now targeting Fortnite users by leveraging their competitive zeal.
A new ransomware auto-denominated “Syrk,” built with tools available on the internet, has been found to be masquerading as a game hack tool for Fortnite, basically a cheat which promises to give players an edge in aiming accurately (an aimbot) and knowing the locations of other players (ESP, in the gamer parlance). We expect it to possibly be distributed via an upload to a sharing site and the link posted in Fortnite users in forums.
Uses Open Source Ransomware, Decryption Possible
We’ve taken a deep dive into the sample reported by Leo to understand how it works, with the step-by-step analysis laid out below, and perhaps most interestingly can report (spoiler alert!) that this Syrk ransomware is in fact Hidden-Cry with a .Syrk extension. The source code for Hidden-Cry is readily available, having been shared on Github at the end of last year.
One principle feature of the Hidden-Cry ransomware is that, as seen in the instructions shown, is the sense of urgency it creates in the victim by deleting files every two hours. However, we believe it is possible for victims to recover deleted files, given the simple method used to delete the files. We also provide instructions at the end to victims on two methods for decrypting files without paying to receive a password.
How It Works
At 12MB, we note that this ransomware is quite large. Checking the file SydneyFortniteHacks.exe / SyrkProject.exe(077eee74b8f1227707b389a953234756d3bf8b78108a24f132bd5feb209dd8f6), it has a lot of files embedded in its resource section. These files are the main component it uses for its malicious routine.
Once the file is executed, it will go through the following 10 steps:
1. Pings gr9wgs94fg5sb3y8l.000webhostapp.com
2. Copies SydneyFortniteHacks.exe to C:UsersPublicDocuments
3. Disables Windows Defender and UAC through a registry tweak
4. Drops the file cgo46ea565sdfse7.exe in C:UsersPublicDocuments
Encryption Process
5. The ransomware executes cgo46ea565sdfse7.exe. Since it is a Hidden-Cry-based ransomware, it drops the following batch files:
- %USERPROFILE%DocumentsWindowsPowerShellModulesCipherCipher.psm1
- %USERPROFILE%DocumentsWindowsPowerShellModulesCiphercry.ps1It imports Cipher.psm1 and tries to encrypt files with the following extensions:
- *.gif, *.sln, *.docx, *.php, *.psd, *.ico, *.mov, *.xlsx, *.jpg, *.xls, *.doc, *.pdf, *.wav, *.pptx, *.ppt, *.txt, *.png, *.bmp, *.rar, *.zip, *.mp3, *.mp4, *.avi
- Key = NDZlODRmYzNlYTJhMDFlMTUwZDE3YzdiMmQzN2JhN2Q=
- Uses .Syrk as extension
6. It then drops the file startSF.exe in C:UsersPublicDocuments
7. Executes startSF.exe to have persistency in the infected machine, which drops and executes a batch file which moves C:UsersPublicDocumentsSydneyFortniteHacks.exe to %appdata%MicrosoftWindowsStart MenuProgramsStartupSydneyFortniteHacks.exe
8. It monitors for the following tools to prevent it from terminating its process:
- Taskmgr
- Procmon64
- ProcessHacker
9. The next step is it will set a timed procedure to try and delete the encrypted files in the directories listed below, deleting the files every two hours in the following order:
- %userprofile%Pictures
- %userprofile%Desktop
- %userprofile%Documents
Propagation
10. Now it will use LimeUSB_Csharp.exe to infect USB drives if they exist. Like Hidden-Cry, LimeUSB’s source code is shared in a code sharing website. It will check for USB drives in the infected machine and will replace the original file with a SCR file.
The original file is copied under the $LimeUSB folder together with its original icon under $LimeIcons. The SCR file will have the same icon as the original file, and once executed it will open the malware copy and the original file, imitating an infected file scenario.
Clicking the showID part of the ransom window will bring you to another window that will show the ID and ask for the password to decrypt the files.
Other Methods for Decrypting Files
Fortunately, the files to decrypt the encrypted files can be found in the infected machine. The file dh35s3h8d69s3b1k.exe is the Hidden-Cry decrypting tool, and can be found as one of the resources embedded in the main malware. Since the key used is already known, it can be used to create a PowerShell script based on the shared source of the Hidden-Cry decrypter. To do this, extract the embedded file dh35s3h8d69s3b1k.exe and execute the file in the infected machine. It will drop the necessary PowerShell script needed to decrypt the files.
As a second approach, the main malware also drops the file where you can find the password. It drops the following files:
- C:UsersDefaultAppDataLocalMicrosoft-i+.txt -> file containing the randomly generated ID
- C:UsersDefaultAppDataLocalMicrosoft-pw+.txt -> file containing the password
- C:UsersDefaultAppDataLocalMicrosoft+dp-.txt -> file contains ID and password. This will be sent to an email address.
Clean-Up
It also has a file to delete the files it dropped. If a password was used to decrypt the files, Delete.exe will be dropped and executed, which will delete the following files:
- C:UsersPublicDocumentsdh35s3h8d69s3b1k.exe
- C:UsersPublicDocumentscgo46ea565sdfse7.exe
- C:UsersPublicDocumentsstartSF.exe
- C:UsersDefaultAppDataLocalMicrosoft+dp-.txt
- C:UsersDefaultAppDataLocalMicrosoft-i+.txt
- C:UsersDefaultAppDataLocalMicrosoft-pw+.txt
It will also drop the file delmy.exe, which will delete the file: %appdata%MicrosoftWindowsStart MenuProgramsStartupSydneyFortniteHacks.exe
Filename | SHA256 | Detection | Details |
---|---|---|---|
SydneyFortniteHacks.exe | 077eee74b8f1227707b389a953234756d3bf8b78108a24f132bd5feb209dd8f6 | W32/Ransom.Krys.A.gen!Eldorado | Main malware sample |
cgo46ea565sdfse7.exe | c239d501439b776e93085925eb132ff164b1f3ba4fdc356a00045e8674dc1387 | W32/Ransom.LH.gen!Eldorado | component for encrypting files |
dh35s3h8d69s3b1k.exe | 08baaf7c861748b227a93e41e28f99a258eb4ce149fa31b7ffe93bc23e385709 | W32/Ransom.LH.gen!Eldorado | component for decrypting files |
startsf.exe | 31c3e1c03b15347bf8184854e65261a81ba12db0dcf3aeb5344ced6d8321ddf1 | W32/Batdrop.A.gen!Eldorado | component for creating persistency |
delmy.exe | fb8bac3a3d04aff294be9ede1d5742ebcab59c3bc14143e328e33cf71bb59b97 | W32/Batdrop.A.gen!Eldorado | component for deleting persistency |
deletefile.exe | 4197a4146bbf406f21577569290a2772b22af80f4043f670240319fb807cf3d4 | W32/Krysdrop.A | component for cleaning up dropped files |
limeusb_csharp.exe | a3368e8a66a87b01cab209816de2648dc36059cb4ae6e3cf41c9d2aff79f9e0c | W32/Kryslime.A.gen!Eldorado | component for propagation |
SydneyFortniteHacks.exe | 8fef3e33ad10eace4c472942510ce66525daf0282a6bf8d42c9c66bb844ec6ce | W32/Ransom.Krys.A.gen!Eldorado | Main malware sample |
SydneyFortniteHacks.exe | 54b62ed00e7cc8c39b09f53bec692dc7418c654f269f3392d95fba418cc8af20 | W32/Ransom.Krys.A.gen!Eldorado | Main malware sample |
SydneyFortniteHacks.exe | eda75fece8a02eb169b90a02322cd4ff2b1485ad5cdc0da7ddaa2c851a7a2614 | W32/Ransom.Krys.A.gen!Eldorado | Main malware sample |
SydneyFortniteHacks.exe | 36f88efe39d8cf16ae5ea6fb970f779ea4f80c2045a9a1b8da5657d495ddfe35 | W32/Ransom.Krys.A.gen!Eldorado | Main malware sample |
SydneyFortniteHacks.exe | 6b156d23e8e85af8635a101b2c1a8c227cfb01a4092a076f0d00ea82b6f6bb19 | W32/Ransom.Krys.A.gen!Eldorado | Main malware sample |
SydneyFortniteHacks.exe | 794020d4ad5733907bf28e278644351965b38f155637203710550ae77f6c0e15 | W32/Ransom.Krys.A.gen!Eldorado | Main malware sample |
For more information on ransomware protection, check out our page here.