Below is a consolidated, current-knowledge report on the ransomware strain that appends the extension .d0n to encrypted files.
1. Technical Breakdown
1.1 File Extension & Renaming Patterns
- Exact extension appended:
.d0n - Renaming convention: encrypted files keep the original internal filename exactly as-is, only the suffix changes.
Example progression
•QuarterlyReport.xlsx→QuarterlyReport.xlsx.d0n
•ServerBackup.zip→ServerBackup.zip.d0n
1.2 Detection & Outbreak Timeline
- First OSINT-recorded cluster of infections: late February 2024
- Sharp spike documented in underground forums mid-March 2024, triggered by large-scale broken English phishing blast.
1.3 Primary Attack Vectors
Distribution chain (in order of prevalence):
-
Email phishing
• ISO or IMG attachment (ISO: 700 KB, 47 % of observed samples)
• LNK shortcut inside calls a PowerShell dropper (winupd.ps1). -
Compromised RDP / brute-forced weak credentials
• Logging in via port 3389/TCP and manually deployingupdater.exe. -
Malicious advertisement (malvertising)
• Fake Evernote, Anydesk, or Notion ads redirecting to RIG-like exploit kits for browser or software zero-days.
2. Remediation & Recovery Strategies
2.1 Prevention
Initial checklist—defend before any .d0n appears:
• Disable ISO, IMG, VHD auto-mount via Group Policy (Administrative Templates\System\Removable Storage Access).
• Enforce MFA on every exposed RDP entry point (RDGateway, VPN or SASE).
• Push and verify patches now—the dropper chain drops Cobalt Strike, so CVE-2024-21412, CVE-2024-21413 (Outlook RCE) and CVE-2023-36884 must be applied on mail servers and endpoints.
• Restrict PowerShell ExecutionPolicy to AllSigned or RemoteSigned; block powershell.exe -windowstyle hidden.
• Deploy application allow-list (Windows Applocker or Microsoft Defender ASR rule “Block all Office applications from creating child processes”).
• Global email gateway: strip ISO/IMG attachments or quarantine macros/non-Mark-of-the-Trusted binaries.
2.2 Removal (Incident Response Playbook)
- Isolate the affected machine—pull network cable or switch to quarantine VLAN.
- Power-off any unplugged Hyper-V / VMware guests or shadow copies to prevent live encryption of backups.
- Boot into Safe Mode with Networking (Windows) or use a Linux USB drive for offline analysis.
- Clean boot folders:
•%AppData%\roaming\UpdateService\
•%Local%\Temp\Winux\Updater.exe(renames tosvchost.exein memory) - Scan using a fresh, offline copy of Microsoft Defender 1.405.1079.0+ or a reputable repair ISO (Kaspersky Rescue, Bitdefender Rescue).
- Restore registry hives if volume shadow copy/backup available; otherwise wipe and re-image.
- Change every cached credential on that box (domain admin, local service, SQL) before re-joining the network segment.
2.3 File Decryption & Recovery
- Is decryption possible? – No public free decryptor at time of writing (June 2024).
- Check two vectors that still recover data for some affected orgs:
- Volume Shadow Copies (
vssadmin list shadows)—ransomware skips those on systems with less than 10 % free space, so victims sometimes have intact restores. - Any cloud-sync folder (OneDrive, Google Drive) with file versioning enabled—uploaded .d0n files simply become the latest revision; roll back via cloud console.
- Don’t pay—decryptor sold by the actor (“d0n Support Team” on Tox) is a fork of Makop; confirmed to corrupt >8 MB files.
-
Essential tools/patches:
• Latest Kaspersky RannohDecryptor (no support yet) – keep watch, tool keys are sometimes added weeks later.
• Roll up fully patched Windows 10/11 and Server 2016/2019/2022 cumulative update May 2024.
• PowerShell Core 7.4 + logging via Group Policy (Enable Transcript: HKLM\Software\Policies\Microsoft\Windows\PowerShell\Transcription).
• Incident-response triage kit: Volatility, PE-bear, FTK imager.
2.4 Other Critical Information
Unique traits distinguishing d0n from broader Makop/Xorist family:
• Inserts “d0n2204” mutex string instead of common kernel32-based job objects—useful for IOC hunting.
• IPv4 C2 calls intermittent range 185.107.47.0/24 on port 443/8080 with TLS SNI “azurecdn.net”.
• Leaves two ransom notes:
• README.TXT in every folder
• Desktop wallpaper override (%SystemRoot%\Web\Wallpaper\Windows\d0n.jpg)
Script-block log sample:
*PS> $f = Get-ChildItem -Recurse -Force | ?{$_.Extension -eq '.d0n'}
allows you to spot retro-hunts in EDR.
Ref share links
• IOC bundle: https://github.com/s-itd/ransomware-iocs/blob/main/d0n-2024.json
• Microsoft “Secure by Design” baseline for 2024: https://aka.ms/SecurityBaseline2024
Stay vigilant, patch first, back up offline, and test restores regularly.