Home / Threat Actors / 8Base Threat Actor Profile

Overview

8Base is a ransomware group that is reported to have originated from RansomHouse. It is focused on encryption of data and public shaming of organisations by conducting double-extortion ransomware campaigns and threatening to leak stolen data to coerce organisations into paying the ransom. The similarities that exist with RansomHouse mean that there is a realistic possibility that there could be a subsidiary connection.

The group has targeted a wide range of industries, including hospitality, law, healthcare, manufacturing, finance and information technology, with victims located in various countries such as Spain, Italy, the United States, Brazil, Canada, India, France, and the United Kingdom. Although the group has targeted a wide range of industries, the most targeted as of the time of writing has been business services with 17 attacks.

The 8Base ransomware group utilises the 8Base ransomware, SmokeLoader and Phobos. Further, the group operates within the context of the Ransomware-as-a-Service (RaaS) model.

Targeted Sectors

The 8Base ransomware group has targeted a wide range of industry sectors, including hospitality, law, healthcare, manufacturing, finance, and information technology.

Threat Actor Motivations

The 8Base ransomware group has stated on their site that they are “simple pen testers” and focus on targeting organisations that are deemed to be lacking in security maturity as they have “considered their financial gain to be above the interest of their partners / individuals”.

Activity Timeline

The following table contains details regarding recent examples of significant 8Base ransomware operations:

Associated Malware

  • 8Base Ransomware: It is likely that 8Base may be related to the Phobos ransomware group as they share code similarities and use similar file extensions. The malware has been active since at least May 2023. The ransomware strain is loaded via SmokeLoader and uses the ‘.8base’ file extension for encrypted documents.
  • SmokeLoader: A notorious and highly configurable loader malware that has been active since 2011.Its main objective is to download or load stealthier and more effective malware onto infected systems. It is often distributed through phishing campaigns, malicious documents, and fake pirated software or crack sites. SmokeLoader has been observed delivering various malware families, including ransomware, such as Phobos and 8Base.
  • Phobos Ransomware: This ransomware variant is able to encrypt a system without access to the internet as the
    encryption key is hard-coded and uses persistence methods to continue encrypting files in AES-256 with RSA-1024 after the ransom note is created. The ransomware also disables OS processes, recovery mode and firewall.

Indicators of Compromise

8Base Ransomware Group Associated File Hashes (SHA-256):

  • e142f4e8eb3fb4323fb377138f53db66e3e6ec9e82930f4b23dd91a5f7bd45d0
  • 518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c
  • afddec37cdc1d196a1136e2252e925c0dcfe587963069d78775e0f174ae9cfe3
  • c6bd5b8e14551eb899bbe4decb6942581d28b2a42b159146bbc28316e6e14a64
  • 5ba74a5693f4810a8eb9b9eeb1d69d943cf5bbc46f319a32802c23c7654194b0

8Base Ransomware Group Associated File Hashes (SHA -1):

  • 5d0f447f4ccc89d7d79c0565372195240cdfa25f
  • 3d2b088a397e9c7e9ad130e178f885feebd9688b

8Base Ransomware Group Associated File Hashes (MD-5):

  • 9769c181ecef69544bbb2f974b8c0e10
  • 20110ff550a2290c5992a5bb6bb44056

8Base Ransomware Group Associated Domains:

  • wlaexfpxrs[.]org
  • admhexlogs25[.]xyz
  • admlogs25[.]xyz
  • admlog2[.]xyz
  • dnm777[.]xyz
  • serverlogs37[.]xyz
  • dexblog[.]xyz
  • blogstat355[.]xyz
  • blogstatserv25[.]xyz

Mitre Methodologies

Execution
T1204 – User Execution

Persistence
T1547.001 – Registry Run Keys / Startup Folder
T1098 – Account Manipulation6

Defence evasion
T1562.004– Disable or Modify System Firewall

Collection
T1005 – Data from Local System8

Impact
T1486 – Data Encrypted for Impact

Additional Information

8Base Ransomware – VMware Security Blog

 

An Intelligence Terminology Yardstick to showing the likelihood of events

The Quorum Cyber Threat Intelligence team provides threat actor profiles so that you can better understand cybercriminals’ tactics, techniques, and procedures (TTPs).

Download your 8Base report to read more details today.