Skip Navigation
BlackBerry Blog

Threat Thursday: BlackBerry Protect vs. Phoenix Cryptolocker

Introduction

The Phoenix Cryptolocker ransomware variant first appeared in early 2021 and made the headlines due to its involvement in an attack on the American insurance provider CNA Financial.

Utilizing an as-of-yet unknown infection vector, the malware comes signed with a digital certificate in an attempt to appear to be a legitimate utility.

Upon execution, Phoenix Cryptolocker creates a copy of itself under a different name to a location on the host, then detonates this copy and proceeds to enumerate the victim host, searching for targeted file extensions which it then encrypts, appending a ".phoenix" extension to each affected file while at the same time dropping a ransom note to each affected directory.

The ransom note contains instructions on how to contact the attacker via a web address link and/or email address.

Once encryption is completed, the malware proceeds to delete all traces of itself such as the binaries and created folder, leaving the user with just their encrypted files and instructions on how to pay to have them decrypted should they wish.

Impact

The following describes the level of impact along with the likelihood of risk this threat currently presents:

Table 1: Threat Impact

Technical Analysis

Phoenix Cryptolocker comes with several built-in mechanisms designed to help it appear to be a legitimate utility and trick an unwitting user into executing it. The first being that it uses the 7-Zip icon in an attempt to masquerade as a 7-Zip file:

Figure 1: Phoenix Cryptolocker Icon

The second is that it is signed with a digital certificate, issued to a company called “SATURDAY CITY LIMITED”, with a signing date of March 20th 2021:

Figure 2: Phoenix Cryptolocker Digital Cert

An examination of the file’s compilation timestamp shows the same date of March 20th of this year:

Figure 3: Compiler Timestamp

Upon execution, Phoenix Cryptolocker first proceeds to create a new directory in the "C:/%Username%/AppData/Roaming/<installation_folder>" location, where it installs a copy of itself under a random name and without appending a typical Windows executable extension such as “.exe”.

This file also correlates to the same SHA256 as the initial binary.

The naming convention of both the created installation folder and the copied binary typically follow a legitimate-sounding and nondescript format, such as in the example below, where the created folder was named “MessagingApp” with the copied binary titled “Nt”.

This is likely an attempt to remain inconspicuous to a potentially suspicious user or security software:

Figure 4: Copied Binary

The copied binary is then executed with a “/go” switch:

Figure 5: Copied Binary Execution

Figure 6: Execution Path

Where it can be seen running as a sub-process of the initial binary:

Figure 7: Phoenix Cryptolocker Process Tree

It then continues its execution and proceeds to enumerate all directories/files on the victim host and begin its encryption routine, with each affected file being appended with a ".phoenix" file extension:

Figure 8: Phoenix File Extension

Figure 9: Encrypted Files

In tandem with the file encryption, a ransom note titled "PHOENIX-HELP" is also dropped to each directory with its contents containing the malware name, an image of a phoenix, and instructions on how to contact the attacker via an email – “phcontactme[at]c*ck[dot]li” or web link – “hxxps://t[dot]me/phdecrypt”:

Figure 10: PHOENIX-HELP Ransom Note

Should a user navigate to the URL provided within the ransom note, it takes them to a page titled “phoenix helpdesk” which prompts the user to download the messaging app “Telegram” in order to make contact with the attacker:

Figure 11: Phoenix Helpdesk

Upon completion of its encryption routine, the malware then proceeds to invoke the built in Windows® binaries “waitfor.exe” and “attrib.exe” via “cmd.exe” to remove both the original binary and the created folder, along with the copied binary - thereby removing all evidence of itself and leaving the victim with just their encrypted files and the dropped ransom note:

Figure 12: Phoenix Post-Encryption Cleanup

Targeted File Extensions

The below is a partial list of file-types targeted by this ransomware:

.html

.zip

.chm

.inc

.diz

.c

.ss

.rar

.xml

.pdb

.dd64

.h

.qm

.lib

.a

.asm

.txt

.doc

.pl

.1

.vim

.sample

.GPLV2

.GPLV3

.RUNTIME

.pm

.bash

.ico

.tcsh

.zsh

.png

.sh

.cgi

.css

.js

.ioc

.its

.def

.rst

.cmderver

.map

.reg

.lua

.fml

.conf

.bmp

.farconfig

.pyd

.lng

.properties

.api

.au3

.spc

.cspec

.pspec

.sla

.spaspec

.exports

.pdf

.global

.fs

.fsc

.xpm

.csc

.xbm

.tab

.gz

.mo

.docbook

.svgz

.theme

.tmac

.mount

.page

.gr

.db

.bz2

.README

.awk

.7z

.lic 

Table 2: Targeted File Extensions

Exempted File Types

  • .exe
  • .dll
  • .sys

Exempted Folders

  • C:\Windows\System32

BlackBerry Model Assessment

The BlackBerry® model assessment shows the behavior of current and previous BlackBerry® Protect machine learning (ML) models when analyzing this sample:

Yara Rule

The following Yara rule was authored by the BlackBerry Threat Research Team to catch the threat described in this document:


import "pe"
import "math"
import "hash"

rule Mal_Ransom_Phoenix_Cryptolocker
{
    meta:
        description = "Phoenix Cryptolocker Ransomware"
        created_from_sha256 = "008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549"
        author = "Blackberry Threat Research"

    strings:

        $f0 = {48 8D 0D D0 2F 1D 00}
        $f1 = {BA 03 00 00 00 B9 01 00 00 00 E8 1A 00 00 00 48 8B 0D 83 2D 1D 00 E8 C6 00 00 00}
        $f2 = "SATURDAY CITY LIMITED1" ascii
        $f3 = "SATURDAY CITY LIMITED0" ascii
        $f4 = "CBviyMgTWm" wide

    condition:

    // Must be a 64-bit executable
    pe.is_64bit() and

    // Must be less than
    filesize < 2000KB and

    // Must have exact import hash
    pe.imphash() == "5d2ddf9bb9051294e17ea7cb876c77e2" and

    // Must have the below Rich sig hash
    hash.md5(pe.rich_signature.clear_data) == "92a167f693b8a618f06e128e6399ad5c" and

    // Must be signed with the below digital Certificate
    for any i in (0 .. pe.number_of_signatures) : (
         pe.signatures[i].issuer contains "Sectigo RSA Code Signing CA" and
         pe.signatures[i].serial == "3b:00:73:14:84:4b:11:4c:61:bc:15:6a:06:09:a2:86"
      ) and

            // Must have Strings
            all of ($f*)
}

 

Indicators of Compromise (IoCs)

File System

Created

  • PHOENIX-HELP ← Ransom-Note
  • <filename>.phoenix ← Appended File Extension
  • C:\Users\<Username>\AppData\Roaming\<A-Za-z>\<A-Za-z> ← Copy of Main Binary

Deleted

  • All files post-encryption
  • C:\Users\<Username>\AppData\Roaming\<A-Za-z>\<A-Za-z> ← Copy of Main Binary

Mutex

  • \BaseNamedObjects\MachineRendezvous

The BlackBerry Research and Intelligence Team

About The BlackBerry Research and Intelligence Team

The BlackBerry Research and Intelligence team is a highly experienced threat research group specializing in a wide range of cybersecurity disciplines, conducting continuous threat hunting to provide comprehensive insights into emerging threats. We analyze and address various attack vectors, leveraging our deep expertise in the cyberthreat landscape to develop proactive strategies that safeguard against adversaries.

Whether it's identifying new vulnerabilities or staying ahead of sophisticated attack tactics, we are dedicated to securing your digital assets with cutting-edge research and innovative solutions.