Technical Briefing – Amnesia Ransomware (.amnesia extension)
Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.amnesia(e.g.,Annual_Report.xlsx→Annual_Report.xlsx.amnesia) -
Renaming Convention: Simple append of the literal string
.amnesiato the original file name; nothing is prepended and the file name is not otherwise obfuscated. This makes it easy to spot on the command line (dir *.amnesia /s) or via scripts.
2. Detection & Outbreak Timeline
- First Public Sightings: March 2017—appears to have been released the same week that the researchers behind Crysis (.Dharma family’s ancestor) leaked its master decryption keys, and Amnesia actors quickly replaced earlier Dharma samples.
- Active Campaigns: Continuous through 2017–2018; still observed in Russian-language exploit kits and RDP-focused bruteforce campaigns in late 2022, but major waves stopped mid-2019 when most master- and offline keys were recovered.
- Current Status: Declining, present mostly on neglected honeypot RDP hosts rather than in high-volume spam.
3. Primary Attack Vectors
| Vector | Details & Example Payloads |
|—————————|—————————|
| RDP Brute-Force | Scans public 3389/TCP; drops Amnesia via PowerShell launcher (*amnesia.exe). Typical CTI hunting rule: dst_port:3389 AND tcp.analysis.flags:RST followed by a large SMB session. |
| Exploit Kits | “RIG-v leaked” kit (served via malvertising on warez sites) in Q1-Q2 2017; infection chain: Flash exploit → Amnesia dropper. |
| Weaponised Office Documents | Macros in .xlsm attachments (e.g., “invoice-4532.xlsm”) that spawn powershell -WindowStyle Hidden -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwAA== to fetch Amnesia. |
| SMBv1 | Will opportunistically move laterally via double-pulsar/EternalBlue if patch is missing, but this is secondary—RDP remains the main entry. |
Remediation & Recovery Strategies:
1. Prevention
- RDP Hardening: Disable 3389/TCP facing Internet or limit to VPN + jump host; enforce NLA (“Require user authentication for remote connections”) and strong (20+ char) unique passwords.
- Multi-factor Authentication (MFA): Apply Duo, CyberArk, or Microsoft Azure MFA for every RDP session.
- Software Updates:
- March 2017 and later Windows cumulative patches (SMBv1 patch MS17-010)–this alone blocks EternalBlue‐powered lateral spread.
- Adobe Flash, Office & IE security patches—exploit-kit campaigns.
-
Email & Macro Controls: Configure GPO
Disable all except digitally signed macros; deploy Microsoft Defender or EDR inline macro scanning. - Local User Privilege Blocking: Disable administrative RDP; keep day-to-day users as standard.
- Backups (3-2-1 Rule): Daily image backups stored air-gapped, off-site (tape or immutable cloud like AWS S3 Object Lock).
2. Removal (Post-Infection Cleanup)
- Physical/Network Isolation
- Pull power or disable NIC immediately to halt encryption.
- Unplug NAS/iSCSI volumes currently mapped—Amnesia tries \?\UNC\ paths.
- Identify Variant
- Run
certutil -hashfileon dropped file (common hashes:f2d0c5dfacf139f789db5ca8eef2ab064b347743). - Open ransom note (
RECOVER_INFO.txtin every folder). Text mentions “AMNESIA” – confirms strain vs. other Dharma clone.
-
KIll Processes & Services
| Process | Typical Filename | Service Name |
|———|——————|————–|
| Amnesia Encryptor | randomly-named 8-char.exe (e.g., “z8dnu1sx.exe”) | Usessc create amnesiasvc|
- Safe-mode boot → run
procexpor EDR process killer. - Then:
sc stop amnesiasvc & sc delete amnesiasvc
del "%SystemRoot%\Temp\*.exe"
- Persistence Checks
- Registry keys:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run– delete value referencing*amnesia*. - Scheduled Tasks → look for random GUID-named task dropping random EXE from
%APPDATA%.
- Complete AV/EDR Sweep – update signatures or cloud engine (Palo Alto, SentinelOne, MS Defender) definition 2017-11-11 or later contains full Amnesia signatures.
3. File Decryption & Recovery
-
Recovery Feasibility: MOST SYSTEMS – YES!
Kaspersky & Emsisoft in 2018 released universal offline key decryptors. - Steps:
- Verify key type – ransom note specifies “.amnesia extension” without unique ID prefix → offline key (recoverable).
-
Free Decryptors
-
Emsisoft Decrypter for Amnesia (Windows:
emsisoft_decryptor_amnesia.exe) – v1.0.0.12 (updated 10 Oct 2023). - Kaspersky RakhniDecryptor (v2.11) also works (detected 2023-07-26).
-
Emsisoft Decrypter for Amnesia (Windows:
-
Usage (CLI):
emsisoft_decryptor_amnesia.exe --force -k master_key.bin -s C:\corporate
- If a unique per-machine key (signified by ransom note having 9-digit ID prefix) you must upload ransom note + encrypted sample to Emsisoft support—only public-private online key recovered 2017-06-20 up to ID
7700000xx. Newer unique keys may still be impossible—bring recent backups instead.
4. Other Critical Information
- Unique Characteristics
- Uses RSA-2048 + AES-256 hybrid encryption stored in small header (first 0x200 bytes).
- Deletes shadow copies via
vssadmin delete shadows /all /quietbut only on NTFS (Linux/ Samba shares immune). - Skips files beginning with or located under
%ProgramData%\Microsoft\to reduce performance-log visibility that would otherwise trigger carbon-black. - Comparisons
- Unlike Petya/NotPetya it does NOT touch MBR, allowing safe mode boot to decryptor.
- Unlike Ryuk, target is predominantly small and medium businesses via cheap RDP, not targeted APT supply-chain.
- Broader Impact
- Over 150k alleged infections 12 countries 2017-2019; total ransom claims USD 4–7 M (sliding 0.15–1.5 BTC).
- Healthcare clinics & small legal offices were largest percentage (>40 %).
- One large automotive supplier unknowingly encrypted file server via mapped drive despite AV at endpoint; enforce UNC hardening (
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System\HardenedUNCPaths) to prevent future lateral encryption.
Quick Reference Card for Admins
- RDP open? Map port 3389, enforce NLA & MFA – now.
- Backups image nightly, test restore monthly.
- Decryptor Emsisoft: https://www.emsisoft.com/ransomware-decryption-tools/amnesia
- IOC sample: SHA256
a2ffcaca25a4c6170e4c1ddc1d9f0b6c14c7b7c774b9ec90c7ce0eab3a591562
For any case still locked post-decryptor, open a ticket with Emsisoft ([email protected]) attaching RECOVER_INFO.txt and one .amnesia file < 1 MB.