HardBit 4.0 Ransomware Abuses Unsecured RDP and SMB for Access Persistence

HardBit 4.0 Ransomware Abuses Unsecured RDP and SMB for Access Persistence

HardBit ransomware continues its evolution with the release of version 4.0, introducing sophisticated mechanisms to establish persistence through vulnerable network services.

The latest variant leverages open Remote Desktop Protocol (RDP) and Server Message Block (SMB) services as entry points, enabling threat actors to maintain long-term access to compromised networks while deploying advanced evasion techniques that complicate security analysis and response efforts.

Unlike its predecessors, HardBit 4.0 implements the Neshta file infector as a dropper mechanism a significant departure from traditional delivery methods.

Neshta, active since 2003, serves as the initial infection vector by decrypting and extracting the HardBit payload from its own binary before executing it.

Upon infection, the malware establishes persistence by copying itself to the Windows system directory and modifying registry keys to automatically launch whenever executable files are opened, ensuring continued presence even after system reboots.

Initial Access and Lateral Movement

The attack chain begins with brute-force assaults targeting open RDP and SMB services using tools such as NLBrute.

Once initial access is secured, threat actors deploy a custom batch script containing Mimikatz to harvest credentials from compromised systems.

The harvested credentials enable attackers to move laterally across the network, utilizing legitimate remote access protocols to expand their foothold without triggering traditional perimeter defenses.

Following credential theft, the threat actors execute network reconnaissance using KPortScan 3.0 to identify additional RDP endpoints on port 3389 and Advanced Port Scanner to conduct broader network enumeration.

The 5-NS new.exe utility identifies available network shares, creating a comprehensive map of potential targets for lateral movement. This systematic approach allows operators to establish multiple access points throughout the infrastructure.

A distinctive feature of HardBit 4.0 is its runtime authorization requirement. The ransomware demands specific authorization credentials an encrypted ID and encryption key before execution, complicating sandbox analysis and automated detection.

This passphrase protection mechanism forces operators to manually deploy the payload with proper credentials, reducing the risk of accidental exposure during analysis.

The malware aggressively disables Windows Defender through registry modifications and PowerShell commands, systematically targeting Tamper Protection, Real-Time Monitoring, and Anti-Spyware features.

The binary itself is obfuscated using Ryan-_-Borland_Protector Cracked v1.0, a modified variant of ConfuserEx designed to evade static analysis.

Encryption and Data Destruction

Before initiating encryption, HardBit stops critical services including backup software and security tools.

Threat ID Threat Name Attack Module
83232 HardBit 2.0 Ransomware Download Threat Network Infiltration
43877 HardBit 2.0 Ransomware Email Threat Network Infiltration
36087 HardBit 3.0 Ransomware Download Threat Network Infiltration
87265 HardBit 3.0 Ransomware Email Threat E-mail Infiltration
40412 HardBit 4.0 Ransomware Download Threat Network Infiltration
72598 HardBit 4.0 Ransomware Email Threat E-mail Infiltration

Organizations should prioritize securing RDP and SMB services through network segmentation, strong authentication, and continuous monitoring.

The malware then removes recovery mechanisms by deleting shadow copies and turning off the Windows boot status policy, effectively preventing recovery without paying the ransom.

Encrypted files are marked with custom icons and the desktop wallpaper is replaced with a ransom notice.

Notably, the GUI version of HardBit 4.0 includes a “Wiper” mode activated through configuration files.

When enabled, the malware permanently destroys data rather than encrypting it a feature likely sold as an optional upgrade to operators who prioritize data destruction over extortion.

Implementing behavioral detection for Mimikatz execution and network scanning activities can disrupt the attack chain before lateral movement occurs.

Regular security updates and maintaining comprehensive backup solutions remain essential to mitigating HardBit ransomware threats.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link