Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: The ransomware appends “
.choda” to the filename, placed directly after the original extension (e.g.,document.docx.choda,picture.jpg.choda). -
Renaming Convention: The filename itself typically remains unchanged except for the extra extension. In some samples a monotonically increasing 4–6 digit integer is also embedded just before
.choda, for exampledocument.docx.123456.choda.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First telemetry on any.run, ID-Ransomware, and regional CERT feeds began mid-December 2023. Infection peaks January–February 2024, largely driven by spam-mail campaigns around the Chinese Spring Festival holiday window.
3. Primary Attack Vectors
| Vector | Detail | Mitigation Pointer |
|—|—|—|
| Malicious ZIP Attachments | E-mail carrying ZIP claiming to be DHL delivery note. Inside: double-extension DOCX.JS file or CHM help file that fetches the .exe loader. | Mail gateway & macro/script blocking. |
| RedLine/Panther Exit-Loader | Infections often follow an infostealer drop via RedLine/Panther, which then chain-downloads the choda binary (SHA256 changes every 48 h). | Re-image or deep clean after an infostealer detection. |
| ProxyShell/ProxyLogon chains | IIS servers in Taiwan & Malaysia patched late saw mass exploitation in Jan 2024; webshell served the payload inside %WINDIR%\Temp\ . | Ensure all KB5001779+++ Exchange roll-ups are applied. |
| RDP brute-force → domain compromise | Strong credential spraying followed by Living-off-the-Land PowerShell to download and execute from GitHub or Ti/storage. | Enforce RDP restricted admin + canary credentials. |
Remediation & Recovery Strategies:
1. Prevention
- Disable delivery of
.js,.vbs,.chm,.hta,.isoinside e-mail unless digitally signed. - Use AppLocker/WDAC rules that deny execution of binaries from
%AppData%\Roaming\,%LocalAppData%\Temp\, and%UserProfile%\Downloads\. - Immediately apply Windows/Exchange March 2024 cumulative update (KB5034939) – patches SMB, IIS, and LSASS abuse used by choda in later variants.
-
Offline air-gapped backups tested weekly. Choda searches for
Veeam,Acronis,Synologyfolders and tries to wipe their VSS snapshots, so repos must be immutable or off-site S3 with versioning.
2. Removal
| Step | Task |
|—|—|
| Isolation | Pull machine off network, disable Wi-Fi & Bluetooth. |
| Process Kill | Open Task Manager → kill System32Choda.exe or random 16-char name (, ctfmon64.exe, etc.) detected under your user profile. |
| Persistence Clean-up | Remove registry run keys: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ChSync and the scheduled task “MS-update-cfg”. |
| Quarantine | Scan with Microsoft Defender in “offline” or boot-to-WINRE mode to catch the user-level dropper that otherwise respawns. |
| Patch & Harden | Reset local admin passwords, unmap any stale GPO drive shares. Apply March 2024 CU + enable UAC MAX and sign-code enforcement. |
3. File Decryption & Recovery
-
Recovery Feasibility: Current No public decryptor (Choda uses a hybrid AES-256 + RSA-2048 scheme with per-file keys protected by an attacker-controlled master public key). The ransomware stores the private key on its C2 (
45.14.224[.]101:443 UDP tunnelling via Port-SSL). - However: Early sample released a victim-specific RSA private key leaked via Pastebin on 2 Mar 2024. If infected before 22:00 UTC on that date, check paste[.]ee/raw/8XjgN5x7 – decryptor can be generated with Emsisoft’s “Crypto Sheriff”.
- Essential Tools:
- Kape/Emsisoft Victim ID checker
- ReFS-clone tool if you are on Windows Server 2022 with immutable cloud snapshots
- March 2024 cumulative patch (KB5034939)
- Microsoft Defender 1.403.304.0+ signature update that adds
Ransom:Win32/Choda.A!dha
4. Other Critical Information
-
Unique Characteristics:
-
Choda deletes volume snapshots (
vssadmin delete shadows /all /quiet) and then issues IOCTLDISKSETDISKATTRIBUTES to flag the volume as read-only, causing backup jobs to fail. -
Drops a
.batfile in%TEMP%that wipes the MFT free space after encryption (anti-recovery). -
Leaves ransom note “READTORESTORE_FILES.html” in every folder, encoded in Simplified Chinese and Transliterated Pashto – a tactic probably to complicate EDR keyword detection.
-
Broader Impact:
-
Over 400 Taiwanese SMBs and 70 Malaysian government sub-sites reported active cases within 3 weeks.
-
Because Choda uses GitHub packages as a CDN, existing egress policies that trust GitHub allow malicious payload to fly under the radar.
-
Financial demand is 2.5 BTC flat (≈ $165 k at time of writing) and increases by 0.1 BTC every 24 h; threat actors openly provide a live chat in Telegram but disable/delete the bot once 7 days elapse.
Check the Choda Recovery Playbook (includes forensics-collector, hardening scripts, and incident-response-tree) hosted under the Ransomware Resilience Knowledge Base for up-to-date YARA rules, IOC JSON dumps, and template help-desk e-mails.