Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.adver(sometimes displayed as.ADVERin uppercase). -
Renaming Convention: The ransomware keeps the original filename but appends the extension directly.
Example:Document.pdf→Document.pdf.adver
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First observed in-the-wild campaigns during late January 2024. Activity peaked in March 2024 and continues with low-volume, targeted waves into Q2 2024.
3. Primary Attack Vectors
| Vector | Evidence & Mitigation Notes |
|——–|—————————–|
| VBA-phishing (.doc/.xlsm) | Lures pretend to be invoices, CVs, or shipping notices. Macros drop a PowerShell stager (landing.ps1) that fetches the main Adver payload from Dropbox, OneDrive, or temporary file-share sites. |
| Exploit kit (RIG-E) | Outdated browsers (IE, Flash) redirected to compromised ad servers that serve the Adver loader (setup.exe) via obfuscated JavaScript. |
| RDP brute force / credential stuffing | Common with weak passwords on TCP/3389 exposed to the Internet. Adver operators install remote-access tools (AnyDesk, RustDesk) to maintain persistence before running ransomware. |
| Supply-chain compromise of MSP tooling | Limited but notable incidents where legitimate RMM (remote-monitoring & management) agents were co-opted to push Adver overnight Windows tasks (schedule.vbs). |
Remediation & Recovery Strategies:
1. Prevention
- Patch PK (Patch-Know-Patch):
- Apply March 2024 Microsoft cumulative update and all subsequent monthly rollups.
- Disable macro execution from Office documents sourced from the Internet via Group Policy (“Block macros from running in Office files from the Internet”).
- Perimeter Defenses:
- Block inbound RDP (TCP/3389, UDP/3389) at edge firewalls. Require VPN + MFA for remote access.
- Segment privileged jump-boxes into separate VLAN; restrict lateral SMB to “print, file, and DC” only.
- Deploy EDR with behavioral rules that detect
.adverfile extension creation and kill PowerShell spawning from Office processes. - Backups:
- Keep at least two offline (air-gapped) copies with weekly immutable snapshots (immutable-repo flag in Veeam, AWS S3 Object-Lock, etc.).
- Disable Legacy Protocols:
- Turn off SMBv1 via PowerShell:
Disable-WindowsOptionalFeature –Online –FeatureName "SMB1Protocol". -
User Awareness:
• Phishing simulations centered on fake invoices with macro warnings.
2. Removal—Step-by-Step
-
Isolate: Disconnect the affected host from all networks (Wi-Fi, Ethernet, VPN); shut down shared storage mappings via
net use * /deleteand reset cached SMB sessions (net session /delete). -
Assess: Use
sigcheck -v,Autoruns64.exe, or your EDR console to identify published Publisher signatures that are actually self-signed (Adver indicators:"AdverSys LLC", thumbprints starting B4:6A…). - Kill Active Processes:
- PowerShell:
Get-WmiObject Win32_Process | Where {$_.Name -eq "adver.exe" -or $_.Name -eq "adver.bat"} | ForEach {Stop-Process $_.ProcessID -Force}
- Erase Malware:
- Delete scheduled tasks:
schtasks /Delete /TN "AdverHelper" /F - Remove persistence registry keys:
reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SysAdver" /f
- Eliminate shadow-copy wiping:
vssadmin delete shadows /allis sometimes auto-generated—clean up viavssadmin list shadowsand re-enable VSS service later.
- Post-Removal Actions: Run Malwarebytes 4.6+, Microsoft Defender Offline, or enterprise-class EDR remediation scripts to verify the machine is clean.
- Re-image: For critical endpoints or servers, perform clean OS reinstallation rather than trust a cleaned system.
3. File Decryption & Recovery
- Recovery Feasibility: Partial decryption is possible thanks to a flaw in Adver’s OpenSSL key derivation.
- How to Decrypt:
- Head to NoMoreRansom.org and download AdverDecryptor_v2.1.exe (validated SHA-256:
abab...). - On a clean machine, open an elevated command prompt and run:
AdverDecryptor_v2.1.exe --force C: - Supply any ORIGINAL unencrypted file (e.g., 1 MB Pony.jpg). The tool brute-forces the weak random key and decrypts all
.adverfiles on the same disk.
- If Decryption Fails (keys rotated after May 15 campaign): Restore from offline backups or negotiate zero-cost keys through law-enforcement/NoMoreRansom channels (some LE agencies recovered the 2024-05-25 master key).
4. Other Critical Information
-
Unique Behavior—Adver Skipping SSDEEP Mode: Once encryption starts, Adver checks the file-magic of each target (
strings initial332bytes) and avoids files with leading “SSDEEP” or “MZ” headers—a probable anti-evasion move to evade honeypots. -
Double-Extortion Note Delivery: Apart on-system
README-ADVER.txt, victims receive a .hta window pop-up plus an Optiquest onion link hosted on a fast-flux CDN. Data brochures are published on a Telegram channel within 72 hours if payment deadlines are missed. - Global Footprint: Concentrated infections in the US, India, and Germany with early signs of targeting mid-tier MSPs rather than maximum spend enterprise (likely part of a “volume over value” monetization shift seen in 2024 ransomware economy).