BianLian Ransomware Gang Continues to Evolve
Executive Summary
Since our initial report on the ransomware group known as BianLian, we have continued to keep an eye on their activities. Unfortunately, and sadly not surprisingly, the group continues to operate and add to their ever-growing list of victims. Having continued to research BianLian for the past six months or so, we felt the time was right to share an update and some of our findings with the larger community.
In short, BianLian continues to exhibit a high level of operational security and skill in network penetration, seeming to have also found their stride in the pace of their operations. At the same time, the group has been improving their ability to operate the business side of a ransomware organization. Yet perhaps most notably, BianLian has shifted the main focus of their attacks away from ransoming encrypted files to focus more on data-leak extortion as a means to extract payments from victims. Furthermore, they have been attempting to amplify the effectiveness of these extortion threats by tailoring the messages delivered to specific victims in an effort to increase the pressure felt by the organizations.
Same Tactics and Techniques
Much like the old adage “If it ain’t broke, don’t fix it”, BianLian continues to use very similar Tactics, Techniques, and Procedures (TTPs) that were detailed in our first report to perform their initial access and lateral movement within a victim’s network. The group continues to maintain and deploy their custom backdoor, written in Go, which provides another means of remote access to a compromised network. While BianLian has made small tweaks here and there to their backdoor such as updating various support libraries and attempting to better hide in plain sight in some scenarios, the core functionality of their backdoor remains unchanged.
Command and Control Infrastructure
As we’ve learned more from watching the group, we have been able to get a better understanding of the temporal relationship of how BianLian will typically bring a command and control (C2) server online relative to the deployment of their custom backdoor. We have observed multiple instances where BianLian has compiled a backdoor within minutes of when they bring a C2 server online. Sometimes, the binary is created before the C2 is live while in other instances the order is reversed. With such a tight coupling of infrastructure and malware deployment, by the time a BianLian C2 is discovered it is likely that the group has already established a solid foothold into a victim’s network.
In terms of numbers, BianLian appears to have found their stride in the number of C2’s they require to sustain their operations. As figure 1 illustrates, the group appears to bring close to 30 new C2 servers online each month. Thus far in the first half of March, BianLian continues at pace, having already brought 11 new C2 servers online. With an average C2 lifespan of approximately two weeks, the total number of active C2 servers online at any given time is always in flux.
Figure 1
Less Encryption, More Extortion
Perhaps one of the most interesting changes we’ve seen BianLian make to their operations is how they appear to have responded to Avast’s release of a decryption tool that would allow a victim of BianLian to decrypt and recover their files. While BianLian was quick to acknowledge the release of the decryption tool with a short and somewhat terse response posted on their leak site, the group has since chosen to remove the note (shown below for posterity.)
“If you have questions about Avast’s decryptor, you need to know that for each company we create an unique key. Avast published their decrypt tool for build released at summer 2022. It will corrupt any files encrypted by another builds.
For most companies we don’t use crypt and give to managers the opportunity to decide their security issues without notifying lawyers and government departments.
They have the right to decide themselves because third parties force them to company’s suicide.
After these notifications and cooperation company lose reputation and get financial losses in most cases.
So we recommend to write us ASAP and don’t lose time”
The release of the tool appears to have brought about a shift in how BianLian attempts to monetize the successful compromise of a victim. Rather than follow the typical double-extortion model of encrypting files and threatening to leak data, we have increasingly observed BianLian choosing to forgo encrypting victims’ data and instead focus on convincing victims to pay solely using an extortion demand in return for BianLian’s silence. The group promises that after they are paid, they will not leak the stolen data or otherwise disclose the fact the victim organization has suffered a breach. BianLian offers these assurances based on the fact that their “business” depends on their reputation.
“Our business depends on the reputation even more than many others. If we will take money and spread your information- we will have issues with payments in future. So, we will stick to our promises and reputation. That works in both ways: if we said that we will email all your staff and publicly spread all your data- we will.”
While the tactics (email, phone calls, and general harassment) and threats (release of stolen data, reputation damage, and embarrassment) BianLian employs to try and and extract a payment are similar with other ransomware groups, we have seen BianLian take the time to do their research to tailor the threat to their victims. In several instances, BianLian made reference to legal and regulatory issues a victim would face were it to become public that the organization had suffered a breach. The group has also gone so far as to include specific references to the subsections of several laws and statutes. While the applicability of the laws (to the victim and their data) referenced by BianLian would need to be assessed by the courts, at first glance, the laws referenced by the actors did in fact correspond to the jurisdiction where the victim was located. This attention to detail shows that the criminal gang is taking the extra time to tailor threats to their victims to maximize the pressure to pay the ransom.
As if harassing messages and references to seemingly accurate legal issues weren’t enough, BianLian has also increased the frequency in their use of a tactic popular among some ransomware groups: the posting of masked victim details to their leak site. In these scenarios, the ransomware group will post varying degrees of detail about a victim organization, typically masking all but a few letters from the company’s name while at the same time including high level details such as the victim’s industry vertical, geographical location, and revenue numbers.
While BianLian was known to use the masked victim pressure tactic prior to the release of the free decryption tool, the group’s use of the technique has exploded after the release of the tool. Between July 2022 and mid-January 2023, BianLian posted the masked details of victims 14 times. This accounted for 16% of the postings to their leak site during the nearly seven-month timeframe. In just the two months after the decryptor was released, BianLian has already posted details on 22 masked victims, accounting for over half of their postings at 53%.
The speed at which BianLian posts the masked details has also increased over time. If one is to accept the Date of Compromise listed by BianLian as accurate (is there honor amongst thieves?), the group averages just ten days from an initial compromise to ratcheting up the pressure on a victim by posting masked details. In some instances, BianLian appears to have posted masked details within 48 hours of a compromise.
With this shift in tactics, a more reliable leak site, and an increase in the speed of leaking victim data, it appears that the previous underlying issues of BianLian’s inability to run the business side of a ransomware campaign appear to have been addressed. Unfortunately, these improvements in their business acumen are likely the result of gaining more experience through their successful compromise of victim organizations.
Victimology
In the ransomware space, the exact number of victims can never truly be known. However, as of March 13, 2023, BianLian details 118 victim organizations on their leak site. The group continues to take the time to categorize the industry vertical of their victims and tag the corresponding data. When looking at the data, as labeled by BianLian themselves, it is unfortunate to note that organizations that fall under the broader category of Healthcare represent the single largest industry vertical victimized by the group.
Figure 2
And while ransomware is an issue faced by organizations across the globe, in the case of BianLian, the overwhelming majority of their victims are those located within the United States.
Figure 3
Attribution
As we track BianLian’s activities, we continue to gather evidence for attribution. While we have a working theory based on some promising indicators, we believe it would be irresponsible to make any public statements at this time. We value our analytic integrity and will wait until we have enough high-confidence evidence before making any statements of attribution.
Indicators of Compromise
Backdoors
- 076e59781d0759de35022291c3d63bbf4227bd79561d80f52c9073a6278c5077
- 0772fb1102685def711ffe647080e1a9b6597fe60e8f1afe7b457ac97c6ac25e
- 16cbfd155fb44c6fd0f9375376f62a90ac09f8b7689c1afb5b9b4d3e76e28bdf
- 183b28fb93db1c907b32aa9fa2f83c7b0ebcc6724de85707a89e5d03c5be5d12
- 1cba58f73221b5bb7930bfeab0106ae5415e70f49a595727022dcf6fda1126e9
- 207078c70be916bb7d2ad4d206d2dca37406f84313f88699fa57fa9745a055bb
- 228ef7e0a080de70652e3e0d1eab44f92f6280494c6ba98455111053701d3759
- 38d6ec5f93f6722c3573989f1463fb1cba1c01c3a1a0579f329e0d625c57070b
- 42b0606aa2c765c0b0789b47ebd3a3f43144dc0c20b2ff6db648ac5feb0a37a3
- 45f76c5c5126501018f907f886dd23a56dd882ee7d4f41c41d732612b2e4da88
- 46fa9a69989b79b56495a1ece8a45d6d5ae43c600b8a13ef88f3eb9d84efda02
- 487f0d748a13570a46b20b6687eb7b7fc70a1a55e676fb5ff2599096a1ca888c
- 4ca84be5b6ab91694a0f81350cefe8379efcad692872a383671ce4209295edc7
- 53095e2ad802072e97dbb8a7ccea03a36d1536fce921c80a7a2f160c83366999
- 55016f61b9880be414cc4e1280d6bb620cfbe5e1e8e12e305a304d3dff7e209c
- 597c492a5af56d935d360fcfd2c1e89928dde492c86975f2c5cc33ec90b042ce
- 60b1394f3afee27701e2008f46d766ef466caa7711c45ddfd443a71efc39a407
- 61dfe2ccdc7cee55cf0530064499a52bf93bc6c3d8996ed013fcc5692e94c73a
- 667821f5996855bf83507fb1009f5d8d36c1258aa3c776106d453200f3bb0ed3
- 77617775dc6fa8b893607d52c3282ece1912bcdd0b583b418399af2eade249b8
- 7b15f570a23a5c5ce8ff942da60834a9d0549ea3ea9f34f900a09331325df893
- 93953eef3fe8405d563560dc332135bfe5874ddeb373d714862f72ee62bef518
- 93fb7f0c2cf10fb5885e03c737ee8508816c1102e9e3d358160b78e91fa1ebdb
- 96e02ea8b1c508f1ee3c1535547f9b89396f557011e61478644ae5876cdaaca5
- a8e999a7a77d3b9846250a34ebda7d80ea83a79b3714b1f7ac8f92bc52a895fd
- a92dd4885af317d36cd62dac31d0d5c93febd367e8f4412e7593fb48c9f34256
- ac1d42360c45e0e908d07e784ceb15faf8987e4ba1744d56313de6524d2687f7
- adefaad2a9c449d0e9fabb5035422a6ce31d0f26b0109a7c2911f570a6c74144
- afb7f11da27439a2e223e6b651f96eb16a7e35b34918e501886d25439015bf78
- b4249f2effb8dd651458c831d38155346c1e2d30b191bf37197ffa5164d25f7c
- ba3c4bc99b67038b42b75a206d7ef04f6d8abaf87a76c373d4dec85e73859ce2
- c62371f129d19707870c0f9a89b0f8a65970aed02537e358e532e4416bc8678e
- dcc7115496faa0797c32bb6d5d823821f19f5177e09e05dbe0151a6b9e1edfb7
- dd03ea7ba369fc9df641c09f29e4abcb8378b5a8dadd3d7c14d47449525f1716
- e136d635de39d23cef600cc53efd671f1e8aba7d982bde152b21ea1f7c04703e
- e7e097723d00f58eab785baf30365c1495e99aa6ead6fe1b86109558838d294e
- ea5c88fe464562227f483e8fc4eb2cf43e98a897aaaa3e94de4d236d5dc6e7e7
- f3a4fb09a0498e7ab3b33338ca6bc03460e43d437d9f3afbfc1a521c1029ff19
- f3f3c692f728b9c8fd2e1c090b60223ac6c6e88bf186c98ed9842408b78b9f3c
- f6669de3baa1bca649afa55a14e30279026e59a033522877b70b74bfc000e276
- f84edc07b23423f2c2cad47c0600133cab3cf2bd6072ad45649d6faf3b70ec30
Encryptors
- 117a057829cd9abb5fba20d3ab479fc92ed64c647fdc1b7cd4e0f44609d770ea
- 3a2f6e614ff030804aa18cb03fcc3bc357f6226786efb4a734cbe2a3a1984b6f
- 46d340eaf6b78207e24b6011422f1a5b4a566e493d72365c6a1cace11c36b28b
- 7f91e10c39e0a77c83af3ef48061cbb73194c793f9c3c8bc7fa1aa0fc75eb385
- f77433e517f493ca54e6a4603e51739053ebfac03d2764ad9d1f7e00cfadefa0
Active IPs
- 104.223.0[.]85
- 104.234.118[.]129
- 104.238.35[.]26
- 155.94.160[.]243
- 173.232.2[.]41
- 185.99.133[.]112
- 192.161.48[.]51
- 204.152.203[.]94
- 208.123.119[.]100
- 35.157.43[.]44
- 45.86.163[.]228
- 52.53.186[.]224
- 54.144.145[.]126
- 66.85.156[.]83
Historical IPs
- 102.129.214[.]35
- 103.199.17[.]27
- 103.20.235[.]122
- 103.20.235[.]188
- 104.200.67[.]156
- 104.200.67[.]244
- 104.200.67[.]31
- 104.200.73[.]239
- 104.216.17[.]42
- 104.217.8[.]125
- 104.225.168[.]249
- 104.238.35[.]146
- 104.238.57[.]205
- 104.238.61[.]153
- 104.238.61[.]218
- 104.255.168[.]249
- 138.124.183[.]149
- 139.177.146[.]46
- 139.177.146[.]46
- 139.99.176[.]57
- 139.99.52[.]102
- 142.202.205[.]89
- 144.208.127[.]155
- 144.208.127[.]18
- 146.19.173[.]121
- 146.59.102[.]74
- 146.70.161[.]27
- 146.70.87[.]197
- 146.71.81[.]102
- 149.154.158[.]120
- 149.154.158[.]153
- 149.154.158[.]154
- 149.154.158[.]56
- 15.188.49[.]63
- 157.254.194[.]223
- 158.247.200[.]185
- 158.255.215[.]58
- 162.33.177[.]94
- 167.114.188[.]41
- 172.96.137[.]114
- 172.96.137[.]153
- 172.96.137[.]220
- 172.96.137[.]224
- 172.96.137[.]249
- 172.96.137[.]29
- 172.96.188[.]109
- 172.96.188[.]52
- 172.96.189[.]158
- 173.254.204[.]78
- 173.44.226[.]73
- 18.159.131[.]209
- 185.214.10[.]116
- 185.243.112[.]166
- 185.243.115[.]30
- 185.56.137[.]117
- 188.34.155[.]224
- 192.161.48[.]60
- 192.169.6[.]79
- 192.52.167[.]135
- 194.71.227[.]52
- 195.201.127[.]139
- 198.252.101[.]244
- 198.252.109[.]40
- 198.252.109[.]57
- 198.252.109[.]78
- 206.189.128[.]5
- 208.123.119[.]230
- 208.123.119[.]240
- 208.123.119[.]48
- 209.182.225[.]124
- 212.46.38[.]118
- 216.120.201[.]107
- 216.146.25[.]60
- 217.195.153[.]177
- 23.163.0[.]168
- 23.229.117[.]247
- 3.134.86[.]154
- 35.183.14[.]149
- 37.220.31[.]104
- 37.220.31[.]17
- 37.235.54[.]42
- 37.235.54[.]52
- 44.212.9[.]14
- 45.128.156[.]10
- 45.128.156[.]3
- 45.128.156[.]43
- 45.145.186[.]188
- 45.33.119[.]19
- 45.56.165[.]17
- 45.61.136[.]152
- 45.66.249[.]118
- 45.86.230[.]64
- 46.246.96[.]53
- 5.230.70[.]23
- 5.230.72[.]245
- 5.230.73[.]234
- 5.230.73[.]37
- 51.222.96[.]1
- 52.87.206[.]242
- 54.227.224[.]229
- 66.85.147[.]22
- 72.11.134[.]215
- 81.17.28[.]71
- 85.239.52[.]96
- 85.239.53[.]168
- 96.44.135[.]76
- 96.44.156[.]206
- 96.44.157[.]203
IP Context
Active C2s
IP Address | First Seen |
---|---|
104.223.0[.]85 | Early March |
104.234.118[.]129 | Early March |
104.238.35[.]26 | Early March |
155.94.160[.]243 | Mid February |
173.232.2[.]41 | Late February |
185.99.133[.]112 | Late February |
192.161.48[.]51 | Early March |
204.152.203[.]94 | Mid March |
208.123.119[.]100 | Mid March |
35.157.43[.]44 | Late February |
45.86.163[.]228 | Early March |
52.53.186[.]224 | Mid March |
54.144.145[.]126 | Mid March |
66.85.156[.]83 | Late February |
Historical C2s
IP Address | First Seen | Last Seen |
---|---|---|
102.129.214[.]35 | Mid October | Late October |
103.199.17[.]27 | Mid December | Mid January |
103.20.235[.]122 | Late October | Early December |
103.20.235[.]188 | Early September | Late September |
104.200.67[.]156 | Late January | Mid February |
104.200.67[.]244 | Early February | Early March |
104.200.67[.]31 | Early December | Mid January |
104.200.73[.]239 | Early February | Early March |
104.216.17[.]42 | Early October | Early November |
104.217.8[.]125 | Mid November | Mid December |
104.225.168[.]249 | Late January | Mid February |
104.238.35[.]146 | Early November | Mid December |
104.238.57[.]205 | Late November | Late December |
104.238.61[.]153 | Late October | Early November |
104.238.61[.]218 | Mid October | Late November |
104.255.168[.]249 | Mid January | Mid February |
138.124.183[.]149 | Late January | Early March |
139.177.146[.]46 | Early December | Late December |
139.177.146[.]46 | Early December | Late December |
139.99.176[.]57 | Mid November | Mid December |
139.99.52[.]102 | Late January | Early March |
142.202.205[.]89 | Late October | Early December |
144.208.127[.]155 | Early December | Mid January |
144.208.127[.]18 | Early February | Early March |
146.19.173[.]121 | Late October | Mid November |
146.59.102[.]74 | Late September | Late October |
146.70.161[.]27 | Mid December | Mid January |
146.70.87[.]197 | Mid September | Mid October |
146.71.81[.]102 | Mid October | Mid November |
149.154.158[.]120 | Early January | Early February |
149.154.158[.]153 | Late January | Early March |
149.154.158[.]154 | Early December | Mid January |
149.154.158[.]56 | Early January | Early February |
15.188.49[.]63 | Mid February | Late February |
157.254.194[.]223 | Early February | Early March |
158.247.200[.]185 | Late September | Late September |
158.255.215[.]58 | Late October | Late November |
162.33.177[.]94 | Late September | Late October |
167.114.188[.]41 | Late September | Late October |
172.96.137[.]114 | Mid September | Late September |
172.96.137[.]153 | Mid December | Late January |
172.96.137[.]220 | Mid January | Late February |
172.96.137[.]224 | Early November | Early December |
172.96.137[.]249 | Mid December | Mid January |
172.96.137[.]29 | Mid December | Late January |
172.96.188[.]109 | Late October | Early December |
172.96.188[.]52 | Early September | Late September |
172.96.189[.]158 | Mid November | Late December |
173.254.204[.]78 | Mid December | Early January |
173.44.226[.]73 | Late December | Late January |
18.159.131[.]209 | Late January | Mid February |
185.214.10[.]116 | Mid January | Mid February |
185.243.112[.]166 | Late January | Late February |
185.243.115[.]30 | Mid December | Mid January |
185.56.137[.]117 | Mid December | Early January |
188.34.155[.]224 | Early November | Late November |
192.161.48[.]60 | Early December | Early February |
192.169.6[.]79 | Late December | Late January |
192.52.167[.]135 | Late September | Mid October |
194.71.227[.]52 | Late October | Late November |
195.201.127[.]139 | Late October | Mid November |
198.252.101[.]244 | Mid October | Late November |
198.252.109[.]40 | Late December | Early February |
198.252.109[.]57 | Early December | Mid January |
198.252.109[.]78 | Late October | Early December |
206.189.128[.]5 | Early October | Mid November |
208.123.119[.]230 | Late January | Late February |
208.123.119[.]240 | Mid November | Mid December |
208.123.119[.]48 | Mid November | Mid December |
209.182.225[.]124 | Late December | Late January |
212.46.38[.]118 | Mid October | Mid November |
216.120.201[.]107 | Mid November | Mid December |
216.146.25[.]60 | Late January | Early March |
217.195.153[.]177 | Late December | Early February |
23.163.0[.]168 | Mid November | Early December |
23.229.117[.]247 | Early December | Late January |
3.134.86[.]154 | Late January | Late February |
35.183.14[.]149 | Mid February | Late February |
37.220.31[.]104 | Late December | Early November |
37.220.31[.]17 | Late January | Mid January |
37.235.54[.]42 | Late October | Early December |
37.235.54[.]52 | Early November | Late November |
44.212.9[.]14 | Late January | Late February |
45.128.156[.]10 | Late January | Late February |
45.128.156[.]3 | Mid December | Late November |
45.128.156[.]43 | Early January | Early January |
45.145.186[.]188 | Early February | Early March |
45.33.119[.]19 | Early February | Mid February |
45.56.165[.]17 | Late September | Late September |
45.61.136[.]152 | Early September | Late September |
45.66.249[.]118 | Late December | Late January |
45.86.230[.]64 | Early October | Late October |
46.246.96[.]53 | Mid November | Mid December |
5.230.70[.]23 | Late September | Late September |
5.230.72[.]245 | Mid February | Mid March |
5.230.73[.]234 | Mid January | Mid February |
5.230.73[.]37 | Mid December | Mid January |
51.222.96[.]1 | Mid November | Mid December |
52.87.206[.]242 | Late December | Mid January |
54.227.224[.]229 | Early March | Mid March |
66.85.147[.]22 | Late November | Late December |
72.11.134[.]215 | Early December | Early January |
81.17.28[.]71 | Early November | Early December |
85.239.52[.]96 | Late December | Mid November |
85.239.53[.]168 | Late September | Late September |
96.44.135[.]76 | Mid October | Early November |
96.44.156[.]206 | Early January | Mid February |
96.44.157[.]203 | Mid December | Mid February |
If you need help reducing your risk of ransomware attacks and minimizing the impact they can have on your organization if they do occur, [redacted] stands ready to help. We have a passion for helping our clients to become tangibly more secure. We enable them to prevent most cyber incidents and be well prepared for emergencies that can’t be avoided. We have the depth of experience and expertise required to ensure that the solutions we provide are effective for your organization’s specific needs.
Tags:
[r Authors
Lauren is a Senior Threat Researcher at [redacted] where she enjoys hunting for bad guys by understanding their tradecraft and infrastructure. Lauren holds a BS in Mathematics from The Ohio State University, a MS in Cyber Operations from the Air Force Institute of Technology, and a Ph.D. in Computer Science from the University of Tulsa.
Senior Threat Intelligence Analyst at [redacted] who spends his days trying to find the badness lurking in the tubes.
Danny Quist is the Director of Special Projects at [redacted]. He works on the research team developing new methods of reverse engineering, machine learning, and malware detonation. Previously he has worked for MIT Lincoln Laboratory and Los Alamos National Laboratory. He has presented at Blackhat, RSA, Defcon, and DFRWS.