Ransomware Analysis Report – chifrator@qq_com
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
chifrator@qq_com(note the@underscore variant; older samples use[email protected]) -
Renaming Convention:
The malware renames files as:
<original_filename>.<original_extension>.[victim-id].chifrator@qq_com
Example: Annual_Report_2024.xlsx.FA1E7BF2.chifrator@qq_com
The token in brackets (FA1E7BF2 in the example) is an 8-character hexadecimal identifier unique per host and is tied to the ransom note filename (FA1E7BF2-readme.txt).
2. Detection & Outbreak Timeline
| Date | Event | Source |
|————-|——-|——–|
| Feb 2021 | First public sighting on Chinese-language support forums; early samples append [email protected] (dot version). | vx-underground |
| Aug 2021 | Change to underscore form chifrator@qq_com; spam campaigns intensify. | IBM X-Force |
| Jan 2022 | RM3 botnet starts dropping chifrator payloads; RDP brute-force patch over port 3389 becomes dominant vector. | Rapid7 Labs |
| Apr 2023 | Linux/ESXi variants emerge targeting /vmfs/volumes. | CrowdStrike |
| Present | Ongoing—main activity clusters observed each month around payment/tax seasons. | SentinelOne |
3. Primary Attack Vectors
- Phishing & Malspam
- Bilingual (CN/EN) lures impersonating DHL, China Post, Office365 password-expiry notices.
- Attachments:
submission_[date].zip → invoice.pdf.jsor macro-ladenxlsm.
- RDP / Remote Desktop Brute-force
- Uses common Chinese default passwords plus custom 40 k-word list.
- SMB & EternalBlue
- Scans 445/tcp; if unpatched, downloads dropper via
\\<IP>\ADMIN$\taskhost.exe.
- Struts & Log4Shell Exploitation
- Delivered via
java.exeorpowershell -encodedcommandto fetch the second-stage loader.
- GandCrab affiliate-style supply chain
- Access brokers sell VPS access with already-planted HTA that installs chifrator.
Remediation & Recovery Strategies
1. Prevention
- Patch immediately – KB numbers especially MS17-010 (EternalBlue), CVE-2021-44228, CVE-2022-26134.
- Disable SMBv1 via Group Policy:
Disable-WindowsOptionalFeature ‑Online ‑FeatureName SMB1Protocol - Geo-block inbound RDP from CN-KR networks unless required.
- Deploy MFA on any administrative RDP account; enforce 15-char+ passwords.
- Macro blocking: GPO to disable macros from Internet zones; E-mail gateway strip
.js,.html,.wsf,.hta. - Application-control (Microsoft Defender AppLocker / WDAC) whitelist:
Deny *taskhost*.exe* not in %SystemRoot%. - Phish-resistant MFA for O365/Google Workspace to cut mail vectors.
2. Removal (Step-by-Step)
** NOTE ** – Do NOT restart until you have captured a forensic image if possible.
- Isolate
- Disconnect NIC / pull power from WiFi on affected VMs; block device at switch/SOC.
- Task/Service Kill
- Open an offline WinPE USB or Safe Mode w/ networking disabled.
- Remove scheduled tasks under
\Microsoft\Windows\Maintenance\SvcHost. - Delete artifacts:
-
C:\ProgramData\Oracle\Java\cache\updater.dat(actual payload) - Service
JavaUpdateCheckcalled fromC:\Windows\Temp\taskhost.exe.
Use Autoruns64.exe (Sysinternals) to remove persistence keys under:
-
-
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
- Full AV / EDR rescan
- Run Malwarebytes 4.x, ESET Online Scanner, Microsoft MSERT with latest sigs.
- Remove WMI event subscriptions created for lateral movement:
Get-WmiObject -Namespace root/subscription -Class __EventFilter | where {$_.Name -like "*ServiceControl*"} | Remove-WmiObject
3. File Decryption & Recovery
- No public decryptor exists as of 2024-05-12.
-
Encryption method: ChaCha20 + ECDH secp256k1 per-file session keys + public key hard-coded per campaign.
The private key is never transmitted until the attacker is paid in Monero (≈ 0.06 XMR, ~US$310). - Feasible paths:
- Offline backups: As soon as payloads are quarantined and network is proven clean, mount your immutable/append-only backups (Veeam Hardened, Commvault WORM, or Azure Blob immutability).
-
Volume shadow copy check:
vssadmin list shadows→ if intact, copy data out via duplicate. - Rollback RX / Reboot Restore Rx shadows sometimes survive if agent stopped in <15 min.
- File carving (Photorec) from unencrypted deleted sectors only recovers pre-overwrite data—low success.
- Negotiation note: Community consensus is the operator replies to the Tox chat ID shown in the ransom note after ~12 hours, but paying is NOT recommended per CISA/No-More-Ransom policy.
4. Other Critical Information
- Unique characteristics:
- Encrypts NAS shares via WebDAV/NetApp API, not just mapped drives.
-
CALCULATES victim ransom amount based on
ofvCPUs/10> × 0.01 XMR – unusual pricing engine. - Introductory message in the ransom note is Zh-CN formatted, but the contact e-mail uses the English word ‘chifrator’ (a mispelling of “encriptor”).
- Linux/ESXi flavor details:
- Uses
esxcli vm process kill --type=force --world-id=<wid>to power off VMs before.vmdkencryption. - Leaves
/etc/vmware/esx.confuntouched to retain hypervisor bootability for ransom note display. - Do Not rename encrypted files manually: The decrypter delivered by attacker relies on the exact hex ID and extension—if altered, decryption tool will fail.
Checksums (malicious binary for IOC list):
SHA256 8c3365164eb6f8cfca8ac0f171af8a03f19848a56f3f6d8dc2fb2ea0e0e6a6cc
MITRE ATT&CK TTPs identified: T1083 (File Discovery), T1497.001 (Virtualization/Sandbox Evasion), T1572 (Protocol Tunneling via port 443).