DOGE “Big Balls” Ransomware and the False Connection to Edward Coristine
此攻击利用ZIP文件中的欺骗性LNK快捷方式启动多阶段PowerShell感染链,通过CVE-2015-2291漏洞提升权限,并使用定制勒索软件DOGE BIG BALLS结合Wigle.net API进行地理定位。 2025-4-14 13:1:11 Author: cyble.com(查看原文) 阅读量:19 收藏

Key Takeaways

  • This attack leverages a ZIP file with a deceptive LNK shortcut to silently execute a multi-stage PowerShell-based infection chain, ensuring stealthy deployment.
  • A vulnerable driver (CVE-2015-2291) is exploited through a Bring Your Own Vulnerable Driver (BYOVD) technique to gain kernel-level read/write access for privilege escalation.
  • The payload is a customized version of Fog ransomware, branded as “DOGE BIG BALLS Ransomware,” reflecting an attempt to add psychological manipulation and misattribution.
  • Ransomware scripts include provocative political commentary and the use of a real individual’s name and address, indicating intent to confuse, intimidate, or mislead victims.
  • The malware uses router MAC addresses (BSSIDs) and queries the Wigle.net API to determine the victim’s physical location—offering more accurate geolocation than IP-based methods.
  • Extensive system and network information, including hardware IDs, firewall states, network configuration, and running processes, is collected via PowerShell, aiding attacker profiling.
  • Embedded within the toolkit is a Havoc C2 beacon, hinting at the threat actor’s (TA’s) potential to maintain long-term access or conduct additional post-encryption activities.

Overview:

A recent ransomware operation has revealed a blend of technical sophistication and psychological manipulation, setting it apart from conventional attacks. Disguised under a finance-themed ZIP file, the campaign employs deceptive shortcut files and multi-stage PowerShell scripts to deliver custom payloads, including a kernel-mode exploit tool and reconnaissance modules. This layered approach allows attackers to gather in-depth system data while evading conventional defenses.

The ransomware itself, a modified version of Fog, is delivered with a provocative name— “DOGE BIG BALLS Ransomware.” The branding includes references to a known public figure, likely as a deliberate misdirection to draw attention or create confusion. By introducing conspiracy-laced commentary in the code and ransom notes, the TA demonstrates a psychological play designed to unsettle and distract victims during critical moments of response.

What makes this operation particularly notable is the use of a vulnerable Intel driver (CVE-2015-2291) in a Bring Your Own Vulnerable Driver (BYOVD) tactic. By exploiting this flaw, the TA gained kernel-level access, manipulated memory, escalated privileges, and disabled security logging mechanisms—all after deploying the ransomware. A built-in Havoc C2 beacon further signals the TA’s potential to expand into post-encryption activities, such as persistent access or lateral movement.

Geolocation tracking in this campaign is unusually precise. Instead of relying on IP addresses, the TA queries the Wigle.net API using the MAC address of the victim’s router (BSSID), allowing for granular physical location targeting. This technique reflects an advanced understanding of network telemetry and suggests a strong emphasis on tailoring attacks to specific victims.

Figure 1 - Infection chain
Figure 1 – Infection chain

Technical Analysis:

Cyble Research and Intelligence Labs (CRIL) has identified a campaign whose initial infection vector remains unknown. It is suspected to be delivered via spam emails containing ZIP attachments themed around payments. In this campaign, we observed a malicious ZIP file named “Pay Adjustment.zip” containing a shortcut file “Pay Adjustment.pdf.lnk.”

Opening the shortcut file silently executes Command Prompt and PowerShell commands. These commands use “Invoke-WebRequest” to download a PowerShell script named “stage1.ps1” from “hxxps://hilarious-trifle-d9182e.netlify[.]app/stage1[.]ps1”. The script is then executed in memory using Invoke-Expression (IEX), allowing it to run without leaving significant traces on the disk.

Figure 2 - Contents of LNK file
Figure 2 – Contents of the LNK file

stage1.ps1

The PowerShell script “stage1.ps1” acts as a primary component for the attack, checking whether the user has administrative privileges and then downloading and executing other malicious files accordingly.

The PowerShell script stage1.ps1 begins by checking if the current user has administrative privileges. If admin access is detected, it creates a hidden folder named “hidden” within the system’s startup directory at “C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\”. It then uses Invoke-WebRequest to download a binary from “hxxps://hilarious-trifle-d9182e.netlify.app/cwiper.exe”. “This binary, identified as modified Fog Ransomware, is saved under the name “Adobe Acrobat.exe” in the hidden folder, disguised to resemble a legitimate application, and executed using PowerShell’s “Start-Process” command.            

Figure 3 – Code to download ransomware and Kernel exploit tool for Admin User
Figure 3 – Code to download ransomware and Kernel exploit tool for Admin User

The script proceeds to download “ktool.exe,” a kernel exploit tool, from “hxxps://hilarious-trifle-d9182e.netlify.app/ktool[.]exe” and saves it to the %TEMP% directory. It then executes the tool using the PID of the ransomware process along with a hardcoded key—but only if administrative privileges are available. If admin rights are not present, the ransomware binary is instead copied to a hidden subdirectory within the user-specific startup folder (AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hidden\). This location suggests it may be triggered later via an alternate mechanism, as Windows only executes files located directly in the root of the Startup folder.

Figure 4 – Code to Download Ransomware for non-admin user
Figure 4 – Code to Download Ransomware for non-admin user

After that, “stage1.ps1” downloads and executes a separate script named

“lootsubmit.ps1” from “hxxps://hilarious-trifle-d9182e.netlify.app/lootsubmit[.]ps1” using Invoke-WebRequest. The purpose of “lootsubmit.ps1” is to collect additional system and network-related information from the victim’s machine to aid in further profiling.

Figure 5 - Executing lootsubmit.ps1 using IEX
Figure 5 – Executing lootsubmit.ps1 using IEX

In the PowerShell script associated with the ransomware attack, the TAs have embedded provocative and unrelated statements, such as:

“The CIA didn’t kill Kennedy you idiot. Oswald is a very deranged person that felt ostracized by his own country. Even as a defector he assimilated poorly in the USSR.”

This inclusion appears to serve as a psychological tactic, aiming to confuse or unsettle the victim/analyst by introducing unrelated or emotionally charged content.

DOGE BIG BALLS Ransomware

Adobe Acrobat.exe is the customized Fog ransomware payload downloaded and executed by the “stage1.ps1” script. When executed, a confirmation message box prompts for user interaction. The ransomware then proceeds to open the RANSOMNOTE.txt and creates a file named “DbgLog.sys” in the current directory to log its activities in plain text format.

Figure 6 – Doge Big Balls Ransomware Prompt
Figure 6 – Doge Big Balls Ransomware Prompt

The RANSOMNOTE.txt file introduces the TA as Edward Coristine and provides his home address and phone number. The TA demands a payment of 4.721373 Monero (XMR) (~USD1000) to a specified wallet address and threatens a trillion-dollar penalty if the victim fails to submit a list of five work accomplishments from the previous week.

The ransomware, named “DOGE BIG BALLS Ransomware“, is a customized variant of Fog ransomware. The inclusion of “DOGE” in its name appears to be an attempt to associate the attack with Edward Coristine, a 19-year-old software engineer and college student known by the online alias “Big Balls.” Coristine is a prominent member of Elon Musk’s Department of Government Efficiency (DOGE). The use of Coristine’s name and the “DOGE” reference in the ransomware could be a tactic to malign him and the DOGE initiative.

Figure 7 – Ransomnote.txt
Figure 7 – Ransomnote.txt

The ransomware then begins collecting the victim’s system information by executing a series of reconnaissance commands, with the output being written to the previously created “DbgLog.sys” file. The specific commands used are listed in the table below.

CommandPurpose
net config WorkstationShows computer name, domain, and workstation settings.
SysteminfoDisplays system and OS details.
HostnameShows the system’s hostname.
net usersLists all local user accounts.
ipconfig /allShows the full network configuration.
route printDisplays IP routing and gateway info.
arp -AShows IP-to-MAC address mappings.
netstat -anoLists active network connections with PIDs.
netsh firewall show stateShows firewall status and active profiles.
netsh firewall show configDisplays detailed firewall settings.
schtasks /query /fo LIST /vLists all scheduled tasks with details.
tasklist /SVCShows running processes with their services.
net startLists running services.
DRIVERQUERYShows loaded drivers and their details.

After gathering system details, the ransomware begins encrypting files based on configuration parameters embedded within the ransomware binary. These include the RSA public key, targeted file extensions, ransom note filename, directories to skip, file name patterns to ignore, and a list of processes and services to terminate before encryption.

Figure 8 - Configuration details
Figure 8 – Configuration details

After successfully encrypting files with the “.flocked” extension, it drops a “readme.txt” ransom note in every affected folder and deletes the shadow volume copy using the command “vssadmin.exe delete shadows /all /quiet”.

Figure 9 - readme.txt
Figure 9 – readme.txt

The “readme.txt” ransom note includes a link to a “.onion” site that directs victims to a Tor-based chat site managed by the TA. This site is used for communication and ransom negotiations and may be shared among multiple victims.

Figure 10 - Chat window
Figure 10 – Chat window

Privilege escalation and Havoc C2:

ktool.exe is executed by the previously run PowerShell script “stage1.ps1”, which drops and loads the vulnerable driver (CVE-2015-2291) “iqvw64e.sys” as part of a Bring Your Own Vulnerable Driver (BYOVD) technique to gain kernel-level read/write access. It also embeds the Havoc C2 beacon “demon.x64.dll” to enable post-exploitation control. To evade dynamic analysis and detection, it is equipped with execution guardrails.

Ktool.exe is launched with the PID of ransomware and a hardcoded key, which acts as an execution guardrail. This mechanism ensures that ktool.exe only runs as part of the intended attack flow by validating the key internally.

Figure 11 - Key validation
Figure 11 – Key validation

To evade automated detection, ktool.exe employs an additional execution guardrail by checking for the presence of the environment variable “NON_EXISTENT_ENV_VAR”, a common anti-analysis technique used by malware to detect and adapt to analysis or sandbox environments.

After completing its checks, ktool.exe drops a vulnerable driver named “iqvw64e.sys” into the %TEMP% directory and installs it as a kernel-mode service. The current process then enables the SeLoadDriverPrivilege and uses NtLoadDriver to load the driver into the Windows kernel.

Figure 12 – Installing Service
Figure 12 – Installing Service

Once the driver is loaded, “ktool.exe” gains direct read/write access to kernel memory through the “\.\Nal” device interface exposed by the vulnerable driver. It uses this access to escalate the privileges of the ransomware process by locating the SYSTEM process token in memory and assigning it to the ransomware process.

Figure 13 - Escalating privileges
Figure 13 – Escalating privileges

Additional Capabilities

  • ktool.exe bundles a Havoc C2 beacon (demon.x64.dll)—a post-exploitation tool—configured with a local IP address. This indicates that the attacker may be testing or preparing to enable remote command and control capabilities following the ransomware deployment.
  • The tool scans ETW kernel structures, specifically the “EtwpGuidHashTable”, to locate and tamper with “_ETW_REG_ENTRY” entries — a stealthy method used to disable or evade security logging.

Lootsubmit.ps1

Lootsubmit.ps1, executed by the stage1.ps1 script is designed to gather extensive information from a victim’s machine, including both system-related and network-related details. It then transmits the collected data to the TA via the cloud hosting platform “netlify[.]app“.

For system-related information, the script collects data such as the UUID, BIOS serial number, disk specifications, CPU details, core count, RAM size, and operating system information. Additionally, it logs system boot time, uptime, the top five CPU-consuming processes, currently logged-in users, and a timestamp to track system activity.

Figure 14 - Collecting victim's system details
Figure 14 – Collecting victim’s system details

For network-related information, the script collects details such as the victim’s local and external IP addresses, the MAC address of the device, network adapters, the BSSID (MAC address of the connected router), and the gateway’s IP. This information helps the TA understand the victim’s network setup and connectivity.

Figure 15  - Collecting victim's system details
Figure 15  – Collecting victim’s system details

Location Discovery:

Instead of relying on traditional location-tracking methods—such as extracting location data from system artifacts or using IP-based geolocation—the script employs a more accurate technique.

It queries the Wigle.net API “hxxps://api.wigle.net/api” for the BSSID (Basic Service Set Identifier, i.e., the MAC address of the victim’s wireless access point) location using hardcoded Wigle.net API credentials. By leveraging the router’s MAC address, it pinpoints the physical location of the victim’s network. This approach yields much more precise geolocation data compared to conventional IP-based tracking.

Figure 16 – Code to retrieve location using Wigle.net
Figure 16 – Code to retrieve location using Wigle.net

The collected information is URL-encoded into a form-style format and sent via a POST request to the cloud hosting platform at hxxps://hilarious-trifle-d9182e[.]netlify[.]app.

Figure 17 - Collecting information and sending a POST request
Figure 17 – Collecting information and sending a POST request

Conclusion

This sophisticated multi-stage attack demonstrates a well-orchestrated ransomware campaign that begins with a deceptive ZIP file containing a malicious LNK shortcut. The attack leverages PowerShell scripts to establish persistence, exfiltrate sensitive system and network data, and deploy ransomware with privilege escalation via a vulnerable driver “CVE-2015-2291”. The inclusion of a Havoc C2 beacon and anti-analysis techniques indicates advanced post-exploitation capabilities. Overall, the campaign reflects a highly evasive and persistent threat targeting both user-level and system-level environments.

Cyble’s advanced threat intelligence platforms, Cyble Vision and Cyble Hawk, utilize AI-powered analytics and proactive security measures to assist organizations in detecting, investigating, and defending against emerging cyber threats. By providing real-time insights, these solutions bolster defenses against targeted attacks such as the DOGE BIG BALLS Ransomware, enhancing overall cybersecurity resilience.

The Yara rule to detect this ransomware variant can be downloaded from the linked GitHub repository.   

Our Recommendations

  • Implement strict execution policies using Group Policy or AppLocker to block .LNK files and untrusted PowerShell scripts.
  • Log and monitor PowerShell usage through event logs (e.g., 4104) to detect suspicious activity in real-time.
  • Deploy Endpoint Detection and Response (EDR) solutions that can detect fileless malware, suspicious process chains (e.g., PowerShell spawning executables), and command-line anomalies.
  • Use behavior-based analytics to flag uncommon persistence techniques.
  • Limit administrative rights across the organization using Role-Based Access Control (RBAC). Continuously monitor for privilege escalation attempts, especially loading of unsigned or vulnerable drivers, such as the one exploited in CVE-2015-2291.
  • Restrict outbound traffic to unauthorized cloud services like Netlify via DNS and firewall rules. Monitor and block external API calls (e.g., Wigle.net) from endpoints to prevent unauthorized geolocation data exfiltration.

MITRE ATT&CK® Techniques

TacticTechnique NameProcedure
Initial Access (TA0001)Phishing (T1566)Malicious ZIP archive could be delivered via phishing with embedded LNK file.
Execution (TA0002)Command and Scripting Interpreter: PowerShell (T1059.001)PowerShell is used to download and execute payloads via stage1.ps1.
Persistence (TA0003)Boot or Logon Autostart Execution: Startup Folder (T1547.001)Malware is placed in the startup folder for persistence.
Privilege Escalation (TA0004)Token Impersonation/Theft (T1134.001)SYSTEM token is stolen using a vulnerable driver for privilege escalation.
Privilege Escalation (TA0004)Abuse Elevation Control Mechanism: Exploitation for Privilege Escalation (T1068)Uses a vulnerable signed driver (iqvw64e.sys) to gain kernel-level access.
Defense Evasion (TA0005)Obfuscated Files or Information (T1027)stage1.ps1 executes payloads in memory to avoid detection.
Defense Evasion (TA0005)Signed Binary Proxy Execution: Signed Driver (T1218.005)Loads a legitimately signed but vulnerable driver to evade detection.
Discovery (TA0007)System Information Discovery (T1082)Collects system details like UUID, BIOS, CPU, RAM, and OS info.
Discovery (TA0007)System Network Configuration Discovery (T1016)Gathers network config, IP, MAC, BSSID, and gateway info.
Discovery (TA0007)System Location Discovery (T1614)Uses BSSID and Wigle API to determine physical location.
Collection (TA0009)Data from Local System (T1005)Collects system and network data for exfiltration.
Command and Control (TA0011)Ingress Tool Transfer (T1105)Downloads ktool.exe, drivers, and Havoc C2 beacon.
Impact (TA0040)Data Encrypted for Impact (T1486)Encrypts files with “.flocked” extension and drops ransom note.
Impact (TA0040)Inhibit System Recovery (T1490)Deletes shadow copies to prevent recovery.

Indicators of Compromise (IOCs)

IndicatorIndicator TypeDescription
5402c5dc6656697b22a20e90f6ab7a2cd216ce7c70126ed0e855682035c299beSHA-256Pay Adjustment.zip
hxxps://hilarious-trifle-d9182e.netlify.app/Pay%20Adjustment[.]zipURLDownload Pay Adjustment.zip
d802bdaad6713549b5098d3545e07794900869c01a68024a1282fea74d40c4a3SHA-256Pay Adjustment.pdf.lnk
4106345cd7a879597c5132b307f9c616e539616241d39a32393a1a8cd0c23452SHA-256Pay
ffe6f62b8e76fb8be1498e403941406a0f6a4dea8816878c27c031c78ca44045SHA-256stage1.ps1
hxxps://hilarious-trifle-d9182e.netlify[.]app/stage1[.]ps1URLHosts the stage1 PowerShell script
ac6533a2702a16e90746ce9f84895e8d579314c0e18589610e4e281d5571a954SHA-256lootsubmit.ps1
44b7eebf7a26d466f9c7ad4ddb058503f7066aded180ab6d5162197c47780293SHA-256cwiper.exe
3d2cbef9be0c48c61a18f0e1dc78501ddabfd7a7663b21c4fcc9c39d48708e91SHA-256DOGE BIG BALLS Ransomware
f08b5316f6bc009d0cb41d4ce0086e615bf130b667cb2cdceecad07fda24fc49SHA-256DOGE BIG BALLS Ransomware
8e209e4f7f10ca6def27eabf31ecc0dbb809643feaecb8e52c2f194daa0511aaSHA-256DOGE BIG BALLS Ransomware
805b2f5cab2a4ba6088e6b6f91d6f1f0671c61092b571358969d69ff8c184c30SHA-256DOGE BIG BALLS Ransomware
30a6688899c22a3ce4c1b977fae762e3f7342d776e1aa2c90835e785d42f60c1SHA-256DOGE BIG BALLS Ransomware
ecfed78315f942fe0e6762acd73ef7f30c34620615ef5e71f899e1d069dabd9eSHA-256DOGE BIG BALLS Ransomware
2c38a56beec1f7c8b919a1a2d9f9497358e763a1c8d9d71aa8a0e4ef062d3ec2SHA-256DOGE BIG BALLS Ransomware
4ad9216a0a6ac84a7b0b5593b0fc97e27de9cdfeb84ab7e5339ae5a4102100c0SHA-256DOGE BIG BALLS Ransomware
8d843c757aea85087a95794f93071bfacb7c4db06f33520308f39b97cf88cabbSHA-256DOGE BIG BALLS Ransomware
330e415ed1dd462486bd99676ef03bcc1da05c17ced655f82b2fbd0787e7dc8fSHA-256ktool.exe
a59c40e7470b7003e8adfee37c77606663e78d7e3f2ebb8d60910af19924d8dfSHA-256iQVW64.SYS
hxxps://hilarious-trifle-d9182e.netlify[.]app/lootsubmit[.]ps1URLHosts the information stealer script
hxxps://hilarious-trifle-d9182e.netlify[.]app/cwiper[.]exeURLHosts the Fog Ransomware file
hxxps://hilarious-trifle-d9182e.netlify[.]app/ktool[.]exeURLHosts the kernel exploit tool

文章来源: https://cyble.com/blog/doge-big-balls-ransomware-edward-coristine/
如有侵权请联系:admin#unsafe.sh