Bad Rabbit Ransomware

Bad Rabbit is a ransomware strain that spread via hacked websites, infected systems via a fake Adobe installer and held encrypted files for Bitcoin.
Michael Raymond
3 min read
Last updated July 7, 2023

What is Bad Rabbit ransomware?

Bad Rabbit is ransomware belonging to the Petya family of ransomware that hit over 200 organizations throughout Eastern Europe in October of 2017. Targets were primarily Russian media agencies however various corporate networks throughout Russia, Eastern Europe, and Japan were hit due to the method that ransomware used to spread through networks.

Bad Rabbit was spread through a drive-by attack where compromised websites spread a fake Adobe Flash update which, once run, would encrypt system files with RSA 2048 bit keys and demand .05 Bitcoin.

Discover your weak points and strengthen your resilience: Run a Free Ransomware Readiness Test

Who created Bad Rabbit?

The Bad Rabbit ransomware is not currently attributed to any threat group. However, the code and list of domains used for the drive-by attack share enough similarities with NotPetya (also referred to as ExPetr or Nyetya) to lead researchers to believe the same group is responsible for both. NotPetya has links to BlackEnergy and Sandworm Team yet those teams are Russian and Bad Rabbit is primarily targeting Russia which complicates attribution. Some researchers and commentators have proposed Bad Rabbit was a state-funded group targeting dissonant media organizations. However, other than the primary watering hole websites being media related there is no conclusive evidence to support that suggestion.

What systems are vulnerable to Bad Rabbit?

Only unpatched Windows 7 and later Windows operating systems are affected by Bad Rabbit. Initial reports indicated the ransomware did not use any NSA-developed exploits. However, follow-up research by Cisco's Talos Security Intelligence showed Bad Rabbit did in fact use the EternalRomance exploit CVE-2017-0145 to bypass Windows Server Message Block (SMB) file-sharing security and enable remote code execution on Windows systems. That is the same exploit leaked by the Shadow Brokers in April and used by NotPetya in June.

Bad Rabbit Timeline

  1. March 2016 Petya First Spotted
  2. April 2017 Shadow Brokers Leak EternalRomance
  3. June 2017 NotPetya First Spotted
  4. Oct 12th Ukraine’s SBU Warns of imminent attack similar to the NotPetya
  5. Oct 24th 2017 BadRabbit First Spotted

How is Bad Rabbit spread?

The initial attack vectors for Bad Rabbit were compromised Russian media sites. The attackers uploaded fake Adobe Flash Player installers to these websites, which once downloaded and run manually by a user would initiate the Bad Rabbit ransomware.

The compromised websites hosted a redirect to 1dnscontrol[.]com for 6 hours. Once redirected a post request was sent to 185.149.120[.]3 providing the attackers with the user agent and other identifying information. From there the dropper was downloaded from two sources: 1dnscontrol[.]com/index.php and /flash_install.php.

Once a user runs the malicious Adobe Flash Player Executable, Bad Rabbit scans for SMB shares which it then brute forces with a hard-coded list of common credentials. Mimikatz post-exploitation tools are also used to harvest usernames and passwords and gain access to yet more SMB shares.

From there Bad Rabbit would attempt to exploit Windows Management Instrumentation Command-line (WMIC) in order to execute code on networked Windows systems.

Lastly, it uses an EternalRomance implementation, very similar to this publicly available python one, to read and write arbitrary data in the kernel memory space overwriting the session security. Then Bad Rabbit would use the access to run full disk encryption with DiskCryptor an open-source encryption application.

Indicators of Compromise

Bad Rabbit Ransomware Note



Oops! Your files have been encrypted.

If you see this text, your files are no longer accessible. You might have been looking for a way to recover your files. Don't waste your time. Ho one will be able to recover them without our decryption service.

We guarantee that you can recover all your files safely. All you need to do is submit the payment and get the decryption password.

Visit our web service at caforssztxqzf2nm.onion
Your personal installation key#1:



If you have already got the password, please enter it below.
Password#1:

Known Compromised Websites

The following sites were hacked and visitors to them were forced to download the Bad Rabbit installer.

  • hxxp://www.fontanka[.]ru
  • hxxp://www.otbrana[.]com
  • hxxp://grupovo[.]bg
  • hxxp://i24.com[.]ua
  • hxxp://spbvoditel[.]ru
  • hxxp://blog.fontanka[.]ru
  • hxxp://www.pensionhotel[.]cz
  • hxxp://www.sinematurk[.]com
  • hxxp://most-dnepr[.]info
  • hxxp://www.imer[.]ro
  • hxxp://calendar.fontanka[.]ru
  • hxxp://an-crimea[.]ru
  • hxxp://www.online812[.]ru
  • hxxp://www.aica.co[.]jp
  • hxxp://www.mediaport[.]ua
  • hxxp://ankerch-crimea[.]ru
  • hxxp://novayagazeta.spb[.]ru
  • hxxp://osvitaportal.com[.]ua
  • hxxp://www.grupovo[.]bg
  • hxxp://argumenti[.]ru
  • hxxp://bg.pensionhotel[.]com
  • hxxp://argumentiru[.]com
  • hxxp://www.t.ks[.]ua

Command and Control Domains

  • http://caforssztxqzf2nm[.]onion
  • http://185.149.120[.]3/scholargoogle/
  • hxxp://1dnscontrol[.]com/flash_install.php

Extensions Targeted for Encryption by Bad Rabbit

.3ds .7z .accdb .ai .asm .asp .aspx .avhd .back .bak .bmp .brw .c .cab .cc .cer .cfg .conf .cpp .crt .cs .ctl .cxx .dbf .der .dib .disk .djvu .doc .docx .dwg .eml .fdb .gz .h .hdd .hpp .hxx .iso .java .jfif .jpe .jpeg .jpg .js .kdbx .key .mail .mdb .msg .nrg .odc .odf .odg .odi .odm .odp .ods .odt .ora .ost .ova .ovf .p12 .p7b .p7c .pdf .pem .pfx .php .pmf .png .ppt .pptx .ps1 .pst .pvi .py .pyc .pyw .qcow .qcow2 .rar .rb .rtf .scm .sln .sql .tar .tib .tif .tiff .vb .vbox .vbs .vcb .vdi .vfd .vhd .vhdx .vmc .vmdk .vmsd .vmtm .vmx .vsdx .vsv .work .xls .xlsx .xml .xvd .zip

SHA 256 Hash of files

  • 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

Payload Files SHA 256 Hashes

  • 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648
  • 0b2f863f4119dc88a22cc97c0a136c88a0127cb026751303b045f7322a8972f6
  • 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93
  • 301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c
  • 2f8c54f9fa8e47596a3beff0031f85360e56840c77f71c6a573ace6f46412035

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

revil-ransomware-attack-on-kaseya-vsa:-what-you-need-to-know
REvil Ransomware Attack on Kaseya VSA: What You Need to Know
A malicious hotfix was released by Kaseya VSA servers resulting in the compromise and encryption of thousands of nodes at hundreds of businesses by REvil.
a-queen’s-ransom:-varonis-uncovers-fast-spreading-“savethequeen”-ransomware
A Queen’s Ransom: Varonis Uncovers Fast-Spreading “SaveTheQueen” Ransomware
A new strain of ransomware encrypts files and appends them with the extension, “.SaveTheQueen,” and propagates using the SYSVOL share on Active Directory Domain Controllers. Our customers encountered this malware...
what-is-pgp-encryption-and-how-does-it-work?
What is PGP Encryption and How Does It Work?
PGP is an encryption method that provides security and privacy for online communications — we’ll look at how PGP encryption works and how you can use it
hive-ransomware-analysis
Hive Ransomware Analysis
Learn how Hive ransomware exploits public servers, spreads through your network, encrypts sensitive files, and exports victims for cryptocurrency.