📘
CAS Cybersecurity
  • Start
  • Reconnaissance
    • Opensource Intelligence
  • Docker basics and Images
    • Damn Vulnerable Webapp
    • bWAPP
    • Juice Webshop
    • Webgoat
    • Metasploitable 2
    • Metasploitable 3
    • MISP Docker (old)
    • MISP Docker (new)
  • Scanning and Enumeration
    • Scanning with zenmap
    • Scanning with nmap
    • Scanning with msf auxiliary
  • Vulnerability Scanning and Analysis
    • OpenVAS
    • nmap vulnerability scan
    • MSF Auxiliary Modules
  • Exploitation
    • Metasploitable 2
    • Redis Server
    • Print Nightmare
    • Baron Samedit
    • Polkit
    • Heartbleed
  • Man in the Middle
    • ARP Cache poisoning
    • RDP MitM Exercise
  • Windows Hacking
    • Throwback Network
      • Entering the breach
      • Exploring the caverns
      • Webshells and you!
      • First Contact
    • WinAttack LAB
      • Module 01
      • Module 02
      • Module 03
      • Module 04
      • Module 05
      • Module 06
      • Module 07
      • Module 08
      • Module 09
      • Module 10
  • Web Application Security
    • Burp Proxy Introduction
    • DVWA
      • DVWA Exercises 1
      • DVWA Exercises 2
      • DVWA Exercises 3
      • DVWA Exercises 4
      • DVWA Exercises 5
      • DVWA Exercises 6
      • DVWA Exercises 7
      • DVWA Exercises 8
  • CTF and Crypto Exercises
    • Cyberchef Challenge
    • HTB Invite Challenge
    • BSides London 2019 Challenge
    • Ninja Sec Challenge
  • Threat Intelligence
    • MISP Exercise 1
    • MISP Exercise 2
    • MISP Exercise 3
    • MISP Exercise 4
    • MISP Exercise 5
    • MISP Exercise 6
    • MISP Exercise 7
    • MISP Exercise 8
    • Virus Total Graph Exercise
    • RFI Incoming!
  • Forensic Exercises
    • Disk Forensics
      • The Sleuth Kit Intro
      • Filecarving with Foremost
      • Filecarving with scalpel
      • Bulk extractor
      • Disk acquisition with dd
      • Disk acquisition with dcfldd
      • Disk acquisition with ewftools
      • Disk acquisition with FTK Imager
      • Mount disk image (raw)
      • Unknown USB Stick
      • USB Stick Filecarving
      • Autopsy Exercise
    • Windows Forensics
      • Bitunlocker
      • Alternate Datastreams
    • Memory Forensics
      • Volatility2 Basics (Linux)
      • Volatility2 Exercise 1
      • Volatility3 Exercise 1
      • Volatility3 Exercise 2
      • Volatility3 Exercise 3
    • Image Forensics
      • Unswirl Image
      • Manual Filecarving 1
      • Manual Filecarving 2
    • Browser Forensics
    • Mail Header Analysis
    • Timestomping Exercise
    • Network Forensics
      • Tshark Exercise
  • Malware Analysis
    • Ransomware
      • General Introduction
      • Ryuk
      • RansomEXX
      • REvil
      • BlackMatter
      • Hades
      • Egregor
      • DoppelPaymer
    • YARA
      • YARA Install
      • yarGen
      • YARA with Cyberchef
      • TCP dump analysis
      • Memory dump analysis
    • Dosfuscated Scripts
  • Android Malware
    • LAB Setup 1
    • LAB Setup 2
    • Android Manifest
    • Android Permissions
    • APP Tracing with Frida
    • AES Key decryption
    • RedAlert
    • BlackRoseLucy
    • Crackme RE Challenge
  • Forensic Readiness
    • Windows Event Logs
    • Windows Sysmon
    • Sysmon: Capture Clipboard
    • Sysmon: Process Injection
    • Ransomware Detection
      • Signature based
  • Live Response
    • Velociraptor P1
    • Velociraptor P2
    • Velociraptor P3
    • Windows Response LAB
      • Lateral Movement Detection
      • Detect persistence
      • Volatility Analysis
Powered by GitBook
On this page
  • 1. Introduction
  • 2. What is DoppelPaymer?
  • 3. Typical Attack Vectors
  • 4. Attacker TTPs
  • 5. Encryption Method
  • 6. Security Questions
  • Answers

Was this helpful?

  1. Malware Analysis
  2. Ransomware

DoppelPaymer

PreviousEgregorNextYARA

Last updated 3 years ago

Was this helpful?

1. Introduction

This module provides an overview of DoppelPaymer ransomware including how it spreads and the typical attacker TTPs of the group behind the Ransomware.

2. What is DoppelPaymer?

DoppelPaymer is part of a ransomware family called BitPaymer which surfaced in 2017. DoppelPaymer and BitPaymer are likely used by the same threat group considering code similarities in the malware and similarities between ransom notes and payment procedures used along with these ransomware families. This threat group is also referred to as DoppelPaymer. They encrypt the users' data and demand ransom for its decryption. To encrypt the data they use a combination of 2048-bit RSA and 256-bit AES. Typical targets of this group include organizations in healthcare, education, and emergency services.

It is difficult to analyze DoppelPaymer because each sample needs to be provided with a unique command-line argument before execution. This greatly hinders sandbox analysis and slows down manual analysis.

is a tool used to monitor system resources, debug software, and detect malware. However, DoppelPaymer also uses it to both stop processes and gain access to their desired targets within the victim's systems. The intention of using this tool is to prevent any interruptions during the encryption phase of the attack. Process hacker uses a driver to call an internal Microsoft kernel function for process termination.

Once files have been encrypted, DoppelPaymer leaves the victim with a ransom note that typically contains a basic overview of what they have done along with a warning not to shut the computer down or delete any of the encrypted files or ransom messages. The ransom note will also contain a link to an .onion domain. The victim can follow this link to communicate with the attacker to pay their ransom or to release their encrypted files.

The DoppelPaymer group has demanded fees between $25,000 and $1.2 million. One of their tactics has been to tell the user that the decryption fee will be smaller if they get in contact sooner. The victim's link will usually last around 7 days before it is invalid. Any victims who don't pay the ransom fee could find themselves featuring on DoppelPaymer's website, DoppelLeaks, where they post stolen data that has not been paid for release.

It appears that DoppelPaymer has been inactive since around May 2021. Their website is still live, however, it hasn't featured any updates since then. Some are led to believe that this was due to a rebranding to the threat group . Researchers even found an old ransom note by the group which contained a link to DoppelPaymer's portal

3. Typical Attack Vectors

DoppelPaymer operators rely on the manipulation of their victims in order to spread infection and demand ransom. They usually send spear-phishing emails with malicious attachments, tricking recipients into thinking they are legitimate. Victims will then click on these attachments which allows malicious code execution to take place. For these malicious attachments, the DoppelPaymer group uses the Emotet malware.

Upon infection, Emotet communicates with C2 servers in order to perform installations and execute malware. The group does not start encrypting files immediately after gaining access to the network. Instead, DoppelPaymer operators will move through the network in search of high-value targets to attack.

4. Attacker TTPs

DoppelPaymer operators are known to employ various tactics, techniques, and procedures (TTPs) during exploitation. Below is an example of the typical DoppelPaymer attack kill chain.

  • DoppelPaymer attackers gain initial access by sending out emails that contain malicious attachments to their selected victims.

  • Once the the attachment, the code is executed and the malware is downloaded onto the system.

  • Hidden files and directories are used to execute and store malicious files from the attack — possibly to stay undetected for longer.

  • Then, is bypassed so that the attackers can utilize account permissions to dig deeper and explore the network while searching for high-value targets.

  • Once these files have been chosen, DoppelPaymer operators will disable security tools in Windows Defender and by encrypting them using RC4.

  • The attackers then attempt to get a list of within the victim's system. This information will help them determine which accounts exist to aid in follow-on behavior.

  • During the attack, attackers do their best to stay undetected, or at least, difficult to decipher. To do this, they use , which hides any C2 communications. This includes methods such as adding junk data to protocol traffic, using steganography, or impersonating legitimate protocols. Multi-layer is also applied at this stage using AES-256-CBC encryption with zero IV.

  • The victim's files are and a ransom note is left in each directory, demanding payment.

  • On some occasions, DoppelPaymer will also perform a on all backup systems.

5. Encryption Method

DoppelPaymer uses 2048-bit RSA and 256-bit AES to encrypt their victims' files. Once infected, the ransomware generates an AES-256-CBC key for every single file using the CryptGenKey() function. The key is then encrypted using the embedded public master key and encoded with Base64 to store it in the ransom note.

There is also a README file included in the ransom note that contains the encrypted AES key. Each encrypted file is renamed to include the .locked file extension.

6. Security Questions

  1. What tool does DoppelPaymer use to terminate services and processes on victim networks?

  2. What is the website called that DoppelPaymer uses to post stolen data on?

  3. DopelPaymer is part of which ransomware family??

  4. What attack method does DoppelPaymer use to lure their victims in?

  5. What malware type does DoppelPaymer include in their attachments?

  6. What encryption type does DoppelPaymer use to encrypt their victims files?

  7. What is the file extension that each encrypted file is renamed with?

Answers

  1. Process Hacker

  2. Doppel Leaks

  3. BitPaymer

  4. Spear phising

  5. Emotet

  6. 2048-bit RSA and 256-bit AES

  7. locked

Process Hacker
Grief
spear-phishing
victim opens
user account control
obfuscate files or information
accounts
data obfuscation
encryption
encrypted
disk wipe