Researchers have spotted new tactics employed by the CatB ransomware, also referred to as CatB99 or Baxtoy, which has been steadily expanding its campaign since November 2022.
Researchers noted the infamous gang has lately shifted to DLL hijacking via Microsoft Distributed Transaction Coordinator (MSDTC) to extract and launch ransomware payloads.
Upon execution, the ransomware performs three primary checks to determine if the payload is being executed within a virtual environment.
- Type and size of physical RAM
- Size of physical hard disks
- Combinations of processors and cores.
After encrypting each file, the ransomware adds a message urging the victims to make a Bitcoin payment. It stands out from other ransomware in the way that it didn’t have a ransomware note.
Another ability is to harvest sensitive data such as passwords, bookmarks, and history from web browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox.
While the abuse of MSDTC service to covert malicious presence is rare, one such instance was observed in a 2021 espionage campaign distributing Pingback malware. The malware targeted Windows 64-bit systems and used DLL hijacking to bypass security solutions and gain persistence.
CatB joins the list of ransomware families that embrace semi-novel techniques and the unique behavior of appending a note to the encrypted files. Organizations that have their endpoints, networks, and systems secured can quickly respond to CatB attacks.
Indicators of Compromise