Community Security Resource
Ransomware Variant: CRAFTUL
Last update: 25-Mar-2024
TECHNICAL BREAKDOWN
-
File Extension & Renaming Patterns
• Confirmation of File Extension: .craftul (seen in lowercase).
• Renaming Convention:. . .craftul
Example → Report.xlsx.4CR2FUHJGL4QU.craftul -
Detection & Outbreak Timeline
• First public appearance: late December 2023 (initial samples uploaded to VT 29-Dec-2023).
• Widespread activity: February–March 2024 recruitment campaigns of the associated group “Dozens”. -
Primary Attack Vectors
A. Remote Desktop Services
– Continuous brute-force against exposed RDP/3389; success followed by lateral-movement with WMI / PsExec.
– Credential-harvesting via LaZagne & Mimikatz prior to encryption.
B. Phishing Containing Compiled HTA
– ISO/mountable mail attachment containing HTA launcher “TradeInvoice_2024-Q1.iso”.
– HTA drops BPy launcher (“bpy.exe”) which pulls the actual PyXOR-packed payload.
C. ESXi Hypervisor Families
– Uses leaked hypervisor keys+auth tokens to SSH into vCenter/vSphere (TCP 22/443).
– Script “craftctl.sh” greps for powered-on VMs and runsvim-cmd vmsvc/snapshot.removeallfollowed byvim-cmd vmsvc/power.off, then encrypts flat-vmdks with ChaCha20.
D. Exploit of CVE-2023-22515 (Confluence) & CVE-2023-34362 (MOVEit) observed in late-February wave. Payload delivered directly via web-shell components.
REMEDIATION & RECOVERY STRATEGIES
-
Prevention (Deploy Immediately)
• Network
– Disable RDP from Internet (TCP 3389) or restrict to VPN + MFA.
– Segment internal LAN; block SMBv1/EternalBlue at firewall (TCP 445).
• Patching
– CVE-2023-22515 Confluence (upgrade ≥ 8.5.3 or 7.19.16 LTS).
– CVE-2023-34362 MOVEit Transfer (apply vendor patch of July-2023).
• Hardening
– Enforce LAPS for local admin passwords.
– Turn-on Windows Credential Guard & SMB signing.
– Set VMware vCenter: disable SSH root, enforce key-based auth, enable lockdown mode.
• Backups
– Follow 3-2-1 rule: 3 copies, 2 media types, 1 offline/off-site.
– Verify immutable/cloud backups with object-lock (WORM). -
Removal (Infection Cleanup Walk-through)
-
Isolate: Turn off Wi-Fi / unplug network cable.
-
Gather samples (memory + “%TEMP%\bpy.exe”, “%WINDIR%\System32\tasksche.exe”) for forensics then block device.
-
Boot into Safe-Mode-with-Networking or use Windows Defender Offline scan.
-
Delete persistence keys in:
HKEYCURRENTUSER\Software\Microsoft\Windows\CurrentVersion\Run\BpyAgent
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\XinitBak -
Clean scheduled tasks “XinitUpdate” and “ChkBoot”.
-
Re-image impacted machines when possible; patch fully after restore.
-
Reset ALL privileged passwords & clear cached RDP credentials.
-
File Decryption & Recovery
• Is a decryptor available?
– No public decryptor yet. Analysis by Kaspersky & Emsisoft (Feb-2024) confirmed use of ChaCha20 with unique 256-bit key per file, RSA-4096-wrapped per victim. No known flaws.
– Current stance: Decryption possible only if offline master keys get retrieved by law-enforcement (similar to Hive takedown).
• Shadow Copies / VSS?
– Craftul deletes “vssadmin delete shadows /all /quiet” and “wmic shadowcopy delete”. Double-check Recycle Bin for undelete; in rare BurstBackup scenarios backups survive.
• VMware vSphere Recovery:
– If snapshots are gone but VMFS backups are replicated to NFS repo with different authentication tier, evacuate & re-import.
• Recommended backup-verification set: Veeam, Commvault, or Rubrik with immutable buckets (S3 Object Lock). -
Other Critical Information
• Distinguishing behaviour: concurrently encrypts Windows AND Linux VMs via dual-phase toolkit (“craftul.exe” & “craftctl.sh”), making restoration of mixed stack environments extremely complex.
• New tactic: Crafts SMBv3 signed SMB beacon that advertises itself on \pipe\craftchat; referenced in the ransom note “README_DECRYPT.craftul.txt” where interactive chat is offered through qTox ID.
• Broader Impact: Impacts small-to-medium MSPs that service dentists/clinics (US & UK observed). MFA bypass via Evilginx 3.5.6 phishing kit. IC3 & NCSC published sectoral alerts March-2024.
Essential Tools & Patches (Keep Handy)
• Microsoft “Ransomware Protection Deployment Kit” (KB5012170+March-2024 cumulative, includes DC shadow copy hardening).
• SentinelOne Ranger / CrowdStrike Falcon Identity Protection – detect BTC-mnemonic in MSBuild spawn.
• VMWare vCenter 8.0U2c patch (CVE-2023-34048).
• Mandiant “DECRYPTCRAFTULindicators.csv” IOC bundle (URL: https://github.com/mandiant/sunburst_countermeasures/tree/main/craftul).
• Offline AV rescue: Bitdefender Rescue CD (updated 2024-03-15) detects variant Win32/Filecoder.Craftul.A.
Bottom line for any victim organization: Cooperate with law-enforcement incident response before considering ransom payment—current evidence indicates negotiations now occur through an automated chatbot (“C-Bridge”) with selective key release and high chance of non-recovery after payment.