Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
best(appears as an additional extension appended after the original extension—e.g.,document.xlsx.best). -
Renaming Convention:
original-name.original-extension.best. Original file names and inner folder structures remain legible; only the last extension is newly appended.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period: The earliest samples tagged
bestappeared in wild on 24 June 2019, shortly after the Djvu/STOP family began rotating its extension pool.
3. Primary Attack Vectors
-
Propagation Mechanisms:
• Software-keyware bundles & pirated installers: Infected “cracked” software, Windows activators, game cheats, and key generators hosted on low-trust download portals.
• Malvertising & fake updates: Poisoned Google AdWords, YouTube-comment spam, and bogus Adobe/Chrome updaters.
• Remote intrusion via RDP brute-forcing: Though uncommon for Djvu, a growing minority ofbest-labeled infections in mid-2020 were RDP-borne.
Remediation & Recovery Strategies:
1. Prevention
-
Proactive Measures:
• Disable/third-party filter the expression*setup.exe?keygen|*keygen*.exeat e-mail and web gateways.
• Block creation ofC:\Users\Public\System\ID\PersonalID.txt(Djvu IOC) via group-policy/Falcon prevention rules.
• Patch OS to March-2017 or later (protects from SMBv1/EternalBlue used by related ransomware).
• Enforce software restriction policies forbidding executables in%APPDATA%\and%LOCALAPPDATA%\(ASR rule: Block executable files from running unless they meet a prevalence, age, or trusted list criteria — Microsoft Defender).
• Offline backups (e.g., Veeam immutables, AWS S3 Object Lock).
2. Removal
- Infection Cleanup:
- Disconnect affected host from any network share to prevent lateral crawl.
- Boot into Safe Mode with Networking.
- Run an ESET/Kaspersky rescue disk or Malwarebytes PE to eradicate:
• Background persistence:%LOCALAPPDATA%\<random>\updater.exe
• Task Scheduler entry:ServiceUPD(SHA256: 5f55…bf11). - Flush browser profiles (Djvu drops the “Accent” password-stealer module) and reset Edge/Chrome/Firefox settings.
- Inspect the Registry key
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Runfor suspiciouswinlogon.exepaths. Remove and reboot.
3. File Decryption & Recovery
-
Recovery Feasibility:
• Knownbestencryption keys published by Emsisoft (Dec 2020) allow offline-ID victims to decrypt.
• Online-ID victims must rely on backups or shadow copies—the keys remain server-side only. -
Essential Tools/Patches:
• Emsisoft Decryptor for STOP Djvu (current version 1.0.0.6). Command line flag:DjvuDecryptor.exe --extension best --repair.
• Volume-Shadow exploitation patch: Microsoft security update KB4493132 (May 2019) closes the flaw allowing ransomware to deletevssadmin delete shadows.
• Oracle JRE ≤ 8u192 exploit patch if initial dropper came via malicious JAR—update to latest LTS JRE 11+.
4. Other Critical Information
-
Additional Precautions:
•.bestis part of the Djvu sub-variants wave 242 branch; local file list (_readme.txt) contains dynamic affiliate ID (“BigBoss”, “nox”, etc.) that correlates with payout wallet trail.
• Drops second-stage password-stealers (e.g., Azorult) 4–6 hours post-encryption—changing all credentials is imperative. -
Broader Impact:
• Single largest wallet (1CXveG4VrD9YfZ5W7aq9tfJ**) amassed ~120 BTC ≈ $4.3 M before it was tumbled.
• Secondary data leaks (via stealer side-load) fueled credential-stuffing attacks against a Fortune-500 retailer in Q3 2020.
• Djvu affiliates have since rotated to extensionsbtos,tisc, andlaopi, but the same decryptor works provided victims were hit with an offline key.
Bottom line:
If you discover the*.bestextension, immediately check the ransom note victim ID (C:\SystemID\PersonalID.txt). IDs ending with “t1” indicate an offline key—run Emsisoft and you’re likely to decrypt. Keep the machine offline until cleanup is complete to prevent the stealer exfil phase.