Executive Summary
Background
During a recent review of underground forums, SafeGuard Cyber came across an actor going by the handle “Cerebrate” advertising a piece of ransomware called “Redeemer”. Cerebrate had initially released this piece of ransomware on the underground forum Dread in or around June 2021. Notably, the actor had released the malware free for download.
Multiple times since the initial release, Cerebrate has attempted to advertise the ransomware to individuals asking questions about ransomware tactics on the Dread forum. While the actor stated that the ransomware is free of charge to use, they do request a 20% share of the total amount of the ransom in XMR (Monero), though there appears to be no enforcement mechanisms for this request.
Cerebrate posted that Redeemer is coded from scratch in C++ and does not require a C2 connection to operate the ransomware. The Redeemer package available on Dread includes the builder and the decrypter. The building tool allows the user to specify an email address for the tool to send the decryption key to, and is also used to collect the ransom if the victim pays out. The ransomware itself seems to only be targeting Windows operating systems from Vista onward and must be executed as an administrator in order to target the target system. The developer also touts some features of the malware such as not requiring the internet to use, which can help thwart law enforcement from tracking it, or must find a way to infect the victim on their own.
As seen in the builder, the attacker can specify the amount of the ransom as well. The developer states that the ransomware is a FUD (Fully Undetectable), but does not specify which AV’s it can successfully evade. Another note is that the developer recommends that an attacker should first gain remote access to the victim in order to disable the anti-virus software. It is also important to note that Redeemer does indeed delete itself after execution, furthermore, it will not execute if it detects another version of Redeemer on the victim machine. Redeemer also deletes system logs to mask the attacker.
Here is a look at some of the features of Redeemer as posted by the developer:
Analysis
Actor Assessment
Based on the sample of the Redeemer ransomware and the actor’s actions on the forums, we judge that the “Cerebrate” is of moderate technical sophistication and has moderate coding experience.
Monetization is likely not the highest priority for the actor with the release of Redeemer, meaning that they are either concerned more about operations security or their reputation.
Guide: Learn how to mitigate
the risks of ransomware attacks
Malware Assessment
The download package includes the builder and the decrypter. Once Redeemer is built, the built executable is then sent to the victim.
In the builder, the user can select five different options.
If option three is selected, the builder will then require the user to input several different things such the name of the key file, which is generated by the builder, an email address in which the ransom and decryption key is sent (this can be any email account), the ransom amount (in XMR), and the name of the actual Redeemer executable.
If option three is selected, the builder will then require the user to input several different things such the name of the key file, which is generated by the builder, an email address in which the ransom and decryption key is sent (this can be any email account), the ransom amount (in XMR), and the name of the actual Redeemer executable.
Another option you can select in the builder is to see the contact information of the developer as shown here:
Once the build is complete the following files were created:
In order to execute Redeemer, you must launch it as an administrator or else the file will not execute. If Redeemer is successfully executed it will then begin to encrypt the file system with a .redeem file extension. Here is an example of what the filenames will look like:
A ransom note will also be generated on the victims desktop:
In order to decrypt the system, the attacker must use the decrypter executable and the decryption key that was sent to the attacker's specified email used in the builder.
Impact
While the Redeemer ransomware does not pose any unique threats to defenders in regards to functions not currently found in other ransomware campaigns, it may still have an impact on the ransomware landscape. Since the ransomware is free to use and the payment structure is unenforceable, it may be appealing to entry-level actors and those in need of funds. Additionally, since the malware is pretty easy to use, it could also be appealing to malicious actors with little to no technical sophistication of their own.
It is interesting from a threat landscape sense to see malware like this, because of how accessible and easy to use it is. As this and other free ransomware builders become more readily available and simpler, we may see a surge in activity from idealistically motivated actors like we did in the early 2010’s when participatory DDoS tools like LOIC and HOIC were made easily and readily available. At this time we have no indications of a hacktivist ransomware surge, but it is something we are going to keep an eye on.
At this point Redeemer has yet to catch on in widespread usage, but if Cerebrate continues to promote the ransomware and update features within it, it has the potential to become a commonly used piece of ransomware.
If you are interested in learning more about the SafeGuard Cyber solution, you can take a quick 5-minute tour.