

- Softperfect network scanner command line portable#
- Softperfect network scanner command line license#
- Softperfect network scanner command line windows#
After the files are encrypted the program will write a ransom note to each folder and directory on the system called read_me_unlock.txt.įigure 1 displays the ransom note (redacted for privacy).įigure 1: Ransom note Remote Access Trojan: SombRAT The malware will also encrypt files in the recovery folder at C:\Recovery.


Softperfect network scanner command line windows#
To thwart the recovery of the data, the ransomware uses Windows Management Instrumentation (WMI) to enumerate Volume Shadow copies using the command select * from Win32_ShadowCopy and then deletes copies by ID ( Win32_ShadowCopy.ID). css, and others ( File and Directory Discovery ). When the ransomware is executed, it will enumerate files and folders on the system and encrypt files with the extensions. The payload is a 32-bit executable file that is used to encrypt files on the victim’s system to extort a ransom. If the header is verified, the payload is executed.
Softperfect network scanner command line portable#
The module is decoded in memory and checked to verify that it has a portable executable (PE) header. When the program is executed it will attempt to load into memory a large embedded module that is decoded with a supplied key. The ServeManager.exe artifact is a 32-bit executable file that is executed using the Microsoft Sysinternals remote administration tool, PsExec.exe. c -> Copy the program to the remote system before executing. This should be -realtime, or run this process before any other process. s -> Run the program with system level privileges. d -> Run psexec.exe without any -> Remotely access this list of hostnames/IP addresses. Psexec.exe -d -s -relatime -c ServeManager.exe -key This utility was used to execute the program ServeManager.exe with the following arguments: This tool is part of Microsoft's Sysinternals tool suite. The PsExec.exe artifact is the legitimate remote administration program. After the files are encrypted, the program will write a ransom note to each folder and directory on the system.ĭetails on the ransomware artifacts are below. The malware also encrypts files in the recovery folder ( Data Encrypted for Impact ). To prevent data recovery, FiveHands uses WMI to first enumerate then delete Volume Shadow copies ( Inhibit System Recovery Windows Management Instrumentation ). Note: the NTRUEncrypt public key cryptosystem encryption algorithm (NTRU), is a lattice-based alternative to Rivest-Shamir-Adleman, known as RSA, and Elliptic-curve cryptography, or ECC, and is based on the shortest vector problem in a lattice. FiveHands is a novel ransomware variant that uses a public key encryption scheme called NTRUEncrypt. The malicious cyber actor used PsExec to execute ServeManager.exe, which CISA refers to as FiveHands ransomware ( Execution, System Services: Service Execution, Impact ).
Softperfect network scanner command line license#
The netscan.lic artifact is the Network Scanner license that was included with this submission. any open Remote Desktop Protocol (RDP) ports for several subnets of unrouteable Internet Protocol (IP) addresses.Ī license is required to unlock all of the features of the SoftPerfect Network Scanner.The XML document indicates that a random scan was conducted to identify hostnames on a network and to search for: The netscan.xml artifact is an Extensible Markup Language (XML) document reporting scanning results for the SoftPerfect Network Scanner program. The utility will generate a report of its findings called netscan.xml. The utility can also be used with Nmap for vulnerability scanning. It also scans for remote services, registry, files and performance counters offers flexible filtering and display options and exports NetScan results to a variety of formats from XML to JSON." The SoftPerfect website states that the "SoftPerfect Network Scanner can ping computers, scan ports, discover shared folders, and retrieve practically any information about network devices, via Windows Management Instrumentation (WMI), Simple Network Management Protocol (SNMP), Hypertext Transfer Protocol (HTTP), Secure Shell (SSH), and PowerShell. The netscan.exe artifact is a stand-alone version of the SoftPerfect Network Scanner, version 7.2.9 for 64-bit operating systems. The cyber actor used SoftPerfect Network Scanner for Discovery of hostnames and network services ( Network Service Scanning ).ĭetails on the SoftPerfect Network Scanner artifacts are below. Publicly Available Tool: SoftPerfect Network Scanner The initial access vector was a zero-day vulnerability in a virtual private network (VPN) product ( Exploit Public-Facing Application ).
