SOCRadar® Cyber Intelligence Inc. | Threat Actor Profile: BianLian, The Shape-Shifting Ransomware Group
Home

Resources

Blog
Tem 13, 2023
14 Mins Read

Threat Actor Profile: BianLian, The Shape-Shifting Ransomware Group

Nowadays, there is a rise in the number of ransomware groups with names that mean something. For example, Yanluowang is a deity in Chinese mythology, the god of death and the underworld judge. Some of the groups name themselves for behaving according to that meaning. One of them is BianLian. 

As its name implies, BianLian (变脸), which is a reference to the traditional Chinese art of “face-changing”, is a shape-shifting cyber threat actor known for its agile adaptation and rapid evolution in its tactics, techniques, and procedures. Starting as a banking Trojan, it has swiftly transformed into a full-fledged ransomware group that operates at a global level.

Let’s delve into the BianLian Ransomware Group.

Who Is BianLian?

BianLian is a threat actor that runs a ransomware operation with the same name BianLian ransomware. It first appeared as an Android banking trojan in 2019. However, like its namesake, the traditional Chinese art of “face-changing,” BianLian has demonstrated remarkable adaptability, shifting its operations to focus on ransomware attacks and becoming a ransomware strain first observed in July 2022.

Fig. 1. Illustration of Digital BianLian (Generated using Bing Image Creation powered by Dall-E)
Fig. 1. Illustration of Digital BianLian (Generated using Bing Image Creation powered by Dall-E)

The group has shown a particular proclivity for evolving its tactics rapidly, enhancing its code, and diversifying its attack vectors to evade detection and counteract defensive measures.

How Does BianLian Attack?

BianLian employs a multi-stage attack methodology. Initial access to the target system is often achieved through spearphishing emails containing malicious attachments or links to compromised websites. Upon successful infiltration, the malware will communicate with its command and control (C2) server, downloading additional modules and tools to escalate its privileges and establish a persistent foothold in the compromised system.

  • Initial Access: BianLian gains initial access to networks by leveraging compromised Remote Desktop Protocol (RDP) credentials, likely acquired from initial access brokers or via phishing.
  • Command and Control(C2): The group implants a custom backdoor specific to each victim written in Go and install remote management and access software, such as TeamViewer, Atera Agent, SplashTop, and AnyDesk for persistence and command and control.

The group also creates and/or activates local administrator accounts and changes those account passwords.

  • Defense Evasion: BianLian uses PowerShell and Windows Command Shell to disable antivirus tools, specifically Windows Defender and Anti-Malware Scan Interface (AMSI).
  • Discovery: The group uses a combination of compiled tools, which they first download to the victim environment, to learn about the victim’s environment. These tools include Advanced Port Scanner, SoftPerfect Network Scanner (netscan[.]exe), SharpShares, and PingCastle.

BianLian also uses native Windows tools and Windows Command Shell to query currently logged-in users, query the domain controller to identify all groups, accounts in the Domain Admins and Domain Computers groups, all users in the domain, retrieve a list of all domain controllers and domain trusts, and identify accessible devices on the network.

  • Credential Access: BianLian uses valid accounts for lateral movement through the network and to pursue other follow-on activity. To obtain the credentials, they use Windows Command Shell to find unsecured credentials on the local machine, harvest credentials from the Local Security Authority Subsystem Service (LSASS) memory, download RDP Recognizer to the victim system, and attempt to access an Active Directory domain database (NTDS.dit).
  • Persistence and Lateral Movement: BianLian uses PsExec and RDP with valid accounts for lateral movement. Prior to using RDP, they used Command Shell and native Windows tools to add user accounts to the local Remote Desktop Users group, modified the added account’s password, and modified Windows firewall rules to allow incoming RDP traffic.

BianLian ransomware encrypts the victim’s data, rendering it inaccessible, and then demands a ransom payment to restore access.

Fig. 2. Ransom Note of BianLian (Source: Any.run)
Fig. 2. Ransom Note of BianLian (Source: Any.run)

The group operated following a double-extortion model in which they encrypt data after exfiltration; since the decryptor released by Avast is working, the group switched to an exfiltration-based model to guarantee receiving the ransom payment.

Quick Look at BianLian’s Tor Site

BianLian ransomware group shares their victim announcements on their own TOR website. When the page first opens, we are greeted by certain headings. These headings are, respectively: Home, Companies, Tags and Contacts. Below the headings, the group’s most recent victim announcements are listed.

Fig. 3. BianLian’s TOR website home page
Fig. 3. BianLian’s TOR website home page

The contact page contains the Tox messenger address and onionmail extension contact addresses that the group used and told to download in the ransom note.

Fig. 4. Contact page of BianLian
Fig. 4. Contact page of BianLian

On the Tags page, there is a list of the tags in the victim announcement posts the group has made so far.

Fig. 5. “Tags” page of BianLian
Fig. 5. “Tags” page of BianLian

If you look at a recent victim announcement page made by the group, the extension of the company that was attacked, explanations about the company and the files that were leaked, if any, are listed respectively.

Fig. 6. One of the recent victims of BianLian, the law firm Chadwick, Washington, Moriarty, Elmore & Bunn, P.C.
Fig. 6. One of the recent victims of BianLian, the law firm Chadwick, Washington, Moriarty, Elmore & Bunn, P.C.

Findings on BianLian Ransomware:

We made our analysis using the SHA256 hash “eaf5e26c5e73f3db82cd07ea45e4d244ccb3ec3397ab5263a1a74add7bbcb6e2” on Anyrun

Fig. 7., BianLian
Fig. 7.

When the program first runs, it checks the languages supported by the environment it runs in (T1012). It starts by dropping the ransom note, which contains the Tox messenger ID, Tox messenger GitHub link, victim ID, and the TOR address of the group, to all directories. Since the software communicates via OfficeClickToRun[.]exe, it also leaves this file in the word startup folder (T1562.006).

We observed malware’s use of OfficeClickToRun[.]exe by analyzing another sample of BianLian with Sha-256 of “597C492A5AF56D935D360FCFD2C1E89928DDE492C86975F2C5CC33EC90B042CE”

Fig. 8., BianLian
Fig. 8.

We observed that after a certain period of time, it started stealing activities. First, it steals Web browser information; in our analysis we observed that Mozilla Firefox Profiles folder’s times.json, addons.json, cookies.sqlite, handlers.json, content-prefs.sqlite (T1552.001), container.json(T1555.003) files has been read by the malware. We can suppose that the malware also stole personal data during this process.

Fig. 9., BianLian
Fig. 9.

After all ransom note dropping and stealing activities are completed, it encrypts the files and changes their extensions to .bianlian (T1486).

Fig. 10., BianLian
Fig. 10.

Finally, the program runs CMD[.]exe (T1059.003) and executes the following command in the command line:

“cmd /c del C:UsersadminAppDataLocalTempeaf5e26c5e73f3db82cd07ea45e4d244ccb3ec3397ab5263a1a74add7bbcb6e2[.]exe”

and we see it leaves various files; some of these files are named: “metamodel.jfm.bianlian”, “edb.log.bianlian” and “the-real-index.bianlian”.

According to the information we got from Anyrun’s text report:

Malicious activities of BianLian are:

  • Writes file to Word startup folder,
  • Renames files like Ransomware,
  • Drops executable file immediately after starts,
  • Actions look like stealing of personal data,
  • Steals credentials from Web Browsers.

Suspicious activities are:

  • Checks supported languages,
  • Creates files like Ransomware instructions,
  • Creates files in the program directory,
  • Writes to a desktop.ini file (may be used to cloak folders),
  • Starts CMD.EXE for commands execution,
  • Drops a file with a compile date too recent,
  • Reads the computer name,
  • Executed via COM,
  • Creates files in the user directory,

PE and DOS header information:

Fig. 11.
Fig. 11.

The IP addresses that make the suspicious connections observed in this analysis are:

  • 40.127.240[.]158 (Port 443)
  • 20.31.108[.]18 (Port 443)
  • 20.54.89[.]15 (Port 443)

When we query the first IP address (40.127.240[.]158) on VirusTotal, we see no suspicious warnings at first glance, and the IP address looks clean according to the VirusTotal. After, when we examine the comments tab, we conclude that it is also used by other threat actors, such as Medusa Locker. In addition, this IP address was also mentioned in our Dark Web Profile: Vice Society Ransomware Group blog.

Fig. 12., BianLian
Fig. 12.

When we query 20.31.108[.]18, we see that it looks clean but is used in various stealer activities. And lastly, when we query 20.54.89[.]15, we see that this IP address is also marked as malicious.

Anyrun’s and some of the other BianLian samples’ IoCs we have gathered on our platform are in the appendix section of the article.

Fig. 13. Process tree graphic of BianLian ransomware
Fig. 13. Process tree graphic of BianLian ransomware

What are the Targets of BianLian?

BianLian has a broad attack range. Initially, individual users were the primary targets when it functioned as a banking trojan. With the evolution into more advanced ransomware, the group expanded its target sectors to include businesses, governmental organizations, healthcare facilities, and educational institutions

Targeted Sectors 

The group appears to be particularly interested in sectors with sensitive data and the financial capacity to pay large ransoms. These sectors include:

  • Financial institutions
  • Government
  • Professional Services
  • Manufacturing
  • Media & Entertainment
  • Healthcare
  • Education
  • Law

Targeted Countries

Geographically, the group seems to operate globally, but a higher concentration of attacks is reported in North America and Europe. This might suggest that BianLian is focusing on regions with high economic value.

Fig. 14. Distribution of Countries affected by BianLian (Source: SOCRadar)
Fig. 14. Distribution of Countries affected by BianLian (Source: SOCRadar)

According to SOCRadar’s observations, BianLian mostly targeted organizations based in the United States with about 60% rate. United Kingdom (10.2%) and Canada (6.8%) follows as most targeted victims by BianLian.

Fig. 15. Countries affected by BianLian
Fig. 15. Countries affected by BianLian

What Are The Latest Activities About BianLian?

Recently, BianLian has been responsible for a series of high-profile attacks. For instance, the Cybersecurity and Infrastructure Security Agency (CISA) reported one of the group’s most notable operations in their advisory notice, where they identified BianLian’s shift from simple ransomware to an extortion-based strategy.

DXC Technology also published a report detailing a rapid increase in BianLian’s ransomware activities, emphasizing the group’s effectiveness and growth rate.

Attacks of BianLian Over Time

Looking at the attack frequency of the group, it is seen that it was more active in 2023:

Fig. 16. Total Attack of BianLian (Source: Ransomware.live)
Fig. 16. Total Attacks of BianLian (Source: Ransomware.live)

When we divide their attacks into 2022 and 2023 and look at them in detail:

2022

Fig. 17. Total attacks of BianLian in 2022
Fig. 17. Total attacks of BianLian in 2022 (Data is gathered from Ransomwatch.telemetry.ltd)

In 2022, the group is more active in early October and throughout December.

Fig. 18. BianLian's 2022 attacks by country
Fig. 18. BianLian’s 2022 attacks by country (Data is gathered from Ransomwatch.telemetry.ltd)

Looking at the details of the attacks, it is seen that the majority of the victims are from the United States.

2023

Fig. 19. Total attacks of BianLian in 2023
Fig. 19. Total attacks of BianLian in 2023 (Data is gathered from Ransomwatch.telemetry.ltd)

Looking at the details of 2023, it is seen that the group was much more active than in 2022 and the number of attacks increased in April and May.

Fig. 20. BianLian's 2023 attacks by country
Fig. 20. BianLian’s 2023 attacks by country (Data is gathered from Ransomwatch.telemetry.ltd)

Looking at the details of the attacks, it is seen that the majority of the victims are from the United States, just like in 2022.

What Are the Group’s Latest Attacks?

Murfreesboro Medical Clinic:

Fig. 21. BianLian's Victim: Murfreesboro Medical Clinic
Fig. 21. BianLian’s Victim: Murfreesboro Medical Clinic

Evergreen Seamless Pipes & Tubes:

Fig. 22. BianLian’s Victim: Evergreen Seamless Pipes & Tubes

Ella Insurance Brokerage:

Fig. 23. BianLian's Victim: Ella Insurance Brokerage
Fig. 23. BianLian’s Victim: Ella Insurance Brokerage

Unknown Victims:

Fig. 24. Some of the unknown victim announcements of BianLian which has their name covered using asterisk symbols
Fig. 24. Some of the unknown victim announcements of BianLian which has their name covered using asterisk symbols

In some of the attacks, the group does not give the names of the victims in full and covers them with asterisks. The reason for this may be that negotiations with the victim are ongoing, but they have developed such a method to cause fear in the victim.

Fig. 25. An example of an unknown victim announcement which the group has allegedly exfiltrated about 700 GB file., BianLian
Fig. 25. An example of an unknown victim announcement which the group has allegedly exfiltrated about 700 GB file.

Conclusion

BianLian, borrowing its name from the Chinese art form involving quick changes of masks, represents a significant threat to various sectors around the world. With their evolving tactics, the group has demonstrated its adaptability, resilience, and cunningness. By transitioning from a primary focus on ransomware to an extortion-based approach, BianLian has effectively kept itself at the forefront of cyber threat discussions. 

Their operations not only pose an immediate risk of data loss but also the long-term danger of reputational damage from data leaks. The threat they pose is both direct, through their cyberattacks, and indirect, by creating an environment of fear and uncertainty.

Security Recommendations Against BianLian

Defending against BianLian and similar cyber threats is a multi-layered task. Here are some recommendations:

Employee Training: Awareness is the key when it comes to cybersecurity. Adversaries generally exploit human error to gain initial access. As it is observed, BianLian is getting initial access using spearphishing attachments or links. Regularly conducting cybersecurity awareness training for employees and informing them about the latest phishing techniques and how to report suspected phishing attempts could eliminate most of the risk.

Regular Backups: Keep frequent backups of important data, and ensure that backups are not connected to the main network.

Use Strong Passwords: Use complex and unique passwords for each account. Consider using a password manager to store passwords securely. Also, implementing the MFA solution provides enhanced protection by layering multiple defenses against unauthorized access.

Keep Systems Updated: Regularly update all software and operating systems. This can help protect against vulnerabilities that threat actors like BianLian often exploit.

Monitor Network Traffic: BianLian shifted its business model to double-extortion lately. Monitoring network traffic closely for unusual data flows that could suggest a data breach can play a significant role in the prevention of any data loss.

Use Antimalware Solutions: Using antimalware software could detect and quarantine threats.

Incident Response Plan: Have a clear incident response plan in place. This can help minimize damage in the event of a breach.

It should be remembered that cybersecurity is not a one-time fix but an ongoing process. Constant vigilance and a proactive security approach are essential in fighting against groups like BianLian. When it comes to proactivity, Cyber Threat Intelligence comes to mind. Implementing CTI into business could help detect or prevent an incident before the risk has increased.

By using Ransomware News in the Dark Web News panel in the CTI module of SOCRadar, the latest announcements of BianLian can be followed.

Fig. 26. Ransomware News in CTI Module of SOCRadar XTI, BianLian
Fig. 26. Ransomware News in CTI Module of SOCRadar XTI

Organizations can also use SOCRadar’s Attack Surface Management (ASM) panel to be aware of the current risks in their IT infrastructure.

Fig. 27. BianLian’s Threat Actor/Malware page of SOCRadar XTI’s CTI Module
Fig. 27. BianLian’s Threat Actor/Malware page of SOCRadar XTI’s CTI Module

From the Threat Actor/Malware page, organizations can benefit from IoCs,YARA rules written for this threat actor, and learn about news/forum posts where this actor is mentioned.

Fig. 28. Dashboard in Attack Surface Management of SOCRadar XTI, BianLian
Fig. 28. Dashboard in Attack Surface Management of SOCRadar XTI

MITRE ATT&CK TTPs Used by BianLian

Techniques

ID

Resource Development

Develop Capabilities: Malware

T1587.001

Initial Access

External Remote Services

T1133

Phishing

T1566

Privilege Escalation

Valid Accounts

T1078

Execution

Command and Scripting Interpreter: PowerShell

T1059.001

Command and Scripting Interpreter: Windows Command Shell

T1059.003

Scheduled Task/Job

T1053

Persistence

Account Manipulation

T1098

Create Account: Local Account

T1136.001

Defense Evasion

Modify Registry

T1112

Impair Defenses: Disable or Modify Tools

T1562.001

Impair Defenses: Disable or Modify System Firewall

T1562.004

Credential Access

Unsecured Credentials: Credentials In Files

T1552.001

OS Credential Dumping: LSASS Memory

T1003.001

OS Credential Dumping: NTDS

T1003.003

Discovery

Account Discovery: Domain Account

T1087.002

Domain Trust Discovery

T1482

File and Directory Discovery

T1083

Network Service Discovery

T1046

Network Share Discovery

T1135

Permission Groups Discovery: Domain Groups

T1069.002

Query Registry

T1012

Remote System Discovery

T1018

System Owner/User Discovery

T1033

Lateral Movement

Remote Services: Remote Desktop Protocol

T1021.001

Collection

Clipboard Data

T1115

Command And Control

Ingress Tool Transfer

T1105

Remote Access Software

T1219

Exfiltration

Transfer Data to Cloud Account

T1537

Exfiltration Over Alternative Protocol

T1048

Exfiltration Over Web Service: Exfiltration to Cloud Storage

T1567.002

Impact

Data Encrypted for Impact

T1486

Appendix

IoCs of BianLian:

IOC Type

IOC

URL

hxxp[:]//quickconnect[.]io/Synology[.]me

URL

hxxp[:]//favgrandson7[.]sytes[.]net:1993

URL

hxxps[:]//fv9-2[.]failiem[.]lv/down.php?i=nvge8wkk3

URL

hxxp[:]//cmnb9[.]cc

URL

hxxp[:]//45.15.156[.]210[:]8081

IP

45.92.156[.]105

IP

5.188.6[.]118

IP

40.127.240[.]158

IP

20.31.108[.]18

IP

20.54.89[.]15

E-mail

xxx@mail2tor[.]com

E-mail

swikipedia@onionmail[.]org

CVE

CVE-2023-27350

CVE

CVE-2022-37042

CVE

CVE-2022-27925

CVE

CVE-2021-4034

CVE

CVE-2021-34523

Hash

eaf5e26c5e73f3db82cd07ea45e4d244ccb3ec3397ab5263a1a74add7bbcb6e2

Hash

f7a3a8734c004682201b8873691d684985329be3fcdba965f268103a086ebaad

Hash

de31a4125eb74d0b7cbf2451b40fdb2d66d279a8b8fd42191660b196a9ac468f

Hash

dda89e9e6c70ff814c65e1748a27b42517690acb12c65c3bbd60ae3ab41e7aca

Hash

da7a959ae7ea237bb6cd913119a35baa43a68e375f892857f6d77eaa62aabbaf

For more IOCs, you can visit the Threat Actor/Malware page under the CTI module of SOCRadar XTI Platform.