Ransomware - Nokoyawa 2.0

Nokoyawa 2.0
Decryptor Available
Yes
Description

For more information, please see the entry on Nokoyawa.

The 2.0 version of the Nokoyawa ransomware family features Rust for the first time. It also requires the ransomware operator to use command line arguments when attempting to execute the encryptor, or else it won't run. Furthermore, a specific Base64-encoded configuration file must be passed as an argument. These configurations include options to customize the ransom note name, its contents, and a custom file extension for the encrypted files.

Another notable feature is the introduction of a newer elliptic curve algorithm for the asymmetric encryption algorithm operation in combination with Salsa20. Nokoyawa and Nokoyawa 1.1 both used ECC-SECT233R1 and Nokoyawa 2.0 and Nevada (Nokoyawa 2.1) both use ECC-X25519. Even though the ransomware authors used secure encryption algorithms, their implementations in code contain flaws that allow researchers from ZScaler to create a decryptor. However, you will need the Curve25519 private key for decryption.

Oddly enough, Nokoyawa 2.0 samples discovered in the wild showed compile times before Nokoyawa 1.1 and at the same time as Nevada. This likely means that the ransomware authors simultaneously developed multiple versions of the Nokoyawa ransomware. There are different command line techniques, encryption algorithms, a switch to Rust, and a name change in Nevada.

Ransom note pictures derived from Securelist and Zscalar

Ransomware Type
Crypto-Ransomware
HumOR
Country of Origin
Ukraine
First Seen
Last Seen
Lineage
Extortion Types
Direct Extortion
Double Extortion
Encryption
Type
Hybrid
Files
Salsa20
Key
ECC-X25519
File Extension
<file name>.<custom extension>
Ransom Note Name
<custom file name>
Samples (SHA-256)
259f9ec10642442667a40bf78f03af2fc6d653443cce7062636eb750331657c4
418c1421c2424f152d83aa6886c15c42dd9947b63fcd4544a679eb0477d40dab
47c00ac29bbaee921496ef957adaf5f8b031121ef0607937b003b6ab2a895a12
7095beafff5837070a89407c1bf3c6acf8221ed786e0697f6c578d4c3de0efd6
dbbde4d2b6a8c04c64a2f87de4a4ffa6681f86d1f90efb9d498905cce239e1e9