S0605 EKANS
EKANS is ransomware variant written in Golang that first appeared in mid-December 2019 and has been used against multiple sectors, including energy, healthcare, and automotive manufacturing, which in some cases resulted in significant operational disruptions. EKANS has used a hard-coded kill-list of processes, including some associated with common ICS software platforms (e.g., GE Proficy, Honeywell HMIWeb, etc), similar to those defined in MegaCortex.12
| Item | Value | 
|---|---|
| ID | S0605 | 
| Associated Names | SNAKEHOSE | 
| Type | MALWARE | 
| Version | 2.0 | 
| Created | 12 February 2021 | 
| Last Modified | 08 March 2023 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Associated Software Descriptions
| Name | Description | 
|---|---|
| SNAKEHOSE | 3 | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1486 | Data Encrypted for Impact | EKANS uses standard encryption library functions to encrypt files.12 | 
| enterprise | T1562 | Impair Defenses | - | 
| enterprise | T1562.001 | Disable or Modify Tools | EKANS stops processes related to security and management software.13 | 
| enterprise | T1490 | Inhibit System Recovery | EKANS removes backups of Volume Shadow Copies to disable any restoration capabilities.12 | 
| enterprise | T1036 | Masquerading | - | 
| enterprise | T1036.005 | Match Legitimate Name or Location | EKANS has been disguised as update.exeto appear as a valid executable.1 | 
| enterprise | T1027 | Obfuscated Files or Information | EKANS uses encoded strings in its process kill list.3 | 
| enterprise | T1057 | Process Discovery | EKANS looks for processes from a hard-coded list.134 | 
| enterprise | T1489 | Service Stop | EKANS stops database, data backup solution, antivirus, and ICS-related processes.132 | 
| enterprise | T1016 | System Network Configuration Discovery | EKANS can determine the domain of a compromised host.4 | 
| enterprise | T1047 | Windows Management Instrumentation | EKANS can use Windows Mangement Instrumentation (WMI) calls to execute operations.1 | 
| ics | T0828 | Loss of Productivity and Revenue | EKANS infection resulted in a temporary production loss within a Honda manufacturing plant. 7 | 
| ics | T0849 | Masquerading | EKANS masquerades itself as a valid executable with the filename update.exe. Many valid programs use the process name update.exe to perform background software updates. 8 | 
| ics | T0840 | Network Connection Enumeration | EKANS performs a DNS lookup of an internal domain name associated with its target network to identify if it was deployed on the intended system. 5 | 
| ics | T0881 | Service Stop | Before encrypting the process, EKANS first kills the process if its name matches one of the processes defined on the kill-list. 6 6 EKANS also utilizes netsh commands to implement firewall rules that blocks any remote communication with the device. 5 | 
References
- 
Dragos. (2020, February 3). EKANS Ransomware and ICS Operations. Retrieved February 9, 2021. ↩↩↩↩↩↩↩↩ 
- 
Hinchliffe, A. Santos, D. (2020, June 26). Threat Assessment: EKANS Ransomware. Retrieved February 9, 2021. ↩↩↩↩ 
- 
Zafra, D., et al. (2020, February 24). Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT. Retrieved March 2, 2021. ↩↩↩↩↩ 
- 
Singleton, C. and Kiefer, C. (2020, September 28). Ransomware 2020: Attack Trends Affecting Organizations Worldwide. Retrieved September 20, 2021. ↩↩ 
- 
Ben Hunter and Fred Gutierrez 2020, July 01 EKANS Ransomware Targeting OT ICS Systems Retrieved. 2021/04/12 ↩↩ 
- 
Daniel Kapellmann Zafra, Keith Lunden, Nathan Brubaker, Jeremy Kennelly 2020, July 15 Ransomware Against the Machine: How Adversaries are Learning to Disrupt Industrial Production by Targeting IT and OT Retrieved. 2021/04/12 ↩↩ 
- 
Davey Winder 2020, June 10 Honda Hacked: Japanese Car Giant Confirms Cyber Attack On Global Operations Retrieved. 2021/04/12 ↩ 
- 
Dragos Threat Intelligence 2020, February 03 EKANS Ransomware and ICS Operations Retrieved. 2021/04/12 ↩