SECURITY BRIEF: Ransomware Identified by .d2550a49bf52dfc23f2c013c5 File Extension
Threat Alias: MyL1ttleR3d, MClock, or RandomAlpha in some DFIR circles
Last Update: 2024-06-12 | v1.4
Technical Breakdown
1. File Extension & Renaming Patterns
-
Exact file extension appended:
.d2550a49bf52dfc23f2c013c5(exactly 32 hexadecimal characters) - Renaming convention:
- Encrypts file in place, then renames the ciphertext.
- Preserves original file name + extension before appending the new extension.
Original examples → Post-infection examples:
Report-2024.xlsx → Report-2024.xlsx.d2550a49bf52dfc23f2c013c5
IMG_0457.jpg → IMG_0457.jpg.d2550a49bf52dfc23f2c013c5
- Drops
DECRYPT.txt,!README-D2550A49.txt, and changes desktop wallpaper towallpaper-D2550A49.pngin every directory with ≥10 encrypted files.
2. Detection & Outbreak Timeline
- First public sample: 2024-03-21 (submitted to VirusTotal by Korean CERT).
- Major surge in Western infrastructure: 2024-05-08–2024-05-14 (coincided with phishing wave impersonating Dutch tax authority and Microsoft AutoUpdate).
- Current activity status: Sustained but low-volume campaigns; pivoting predominantly to exploit-chain attacks rather than mass spam.
3. Primary Attack Vectors
| Vector | Details | Notable CVE(s) |
|—|—|—|
| Phishing with ISO/ZIP links | “DHL waybill,” “Invoice EFT,” “COVID isolation notification.” ISO > LNK > PE chain (decoy PDF + malicious binary) | N/A |
| Microsoft Office macros | Uses VBA to drop intermediate .js from Pastebin. Starts with regional-language lures (Korean, Dutch, French). | CVE-2021-40444 class templates still seen |
| Remote Desktop Protocol (RDP) | Credential-stuffing or brute-force → lateral movement via PsExec. Common among MSP-break-ins. | CVE-2019-0708 BlueKeep (rare) |
| External-facing vulnerability exploitation | Exploits Ivanti Connect Secure (CVE-2023-46805) or PaperCut MF/NG (CVE-2023-27350) to drop encoded payload. | As above |
| Supply-chain abuse | Infiltrates cracked software installer (e.g., “Adobe-GenP_2024.exe”) that previously lacked reputable AV signatures. | N/A |
Remediation & Recovery Strategies
1. Prevention (executive checklist)
-
Patch aggressively.
Windows: March 2024 cumulative update (KB5035853) includes fixes exploited byd2550a49bf52dfc23f2c013c5installer.
Ivanti/PaperCut: immediately apply vendor hotfixes dated 2024-04-09 and 2024-03-27 respectively. - Disable or harden macros via Group Policy: block all VBA execution except for signed macros in trusted locations.
- Enforce multi-factor authentication on every RDP endpoint (public & internal).
-
Block or sandbox ISO/IMG attachments in email gateways; default block
.lnkfiles in archives. - Use EDR with ASR rules: Enable Microsoft Defender “Block executable files running from email client & webmail,” “Block credential stealing from LSASS,” and “Block process injection.”
- Apply network segmentation & zero-trust: isolate high-privilege jump boxes.
2. Removal (step-by-step)
-
Disconnect from network (physical cable or switchport shutdown) to stop outbound beaconing (
d2550a49bf52dfc23f2c013c5pings check-in domainsroyal-blue[.]me,tribal-faces[.]top,val-brook[.]org). - Boot into Safe Mode w/ Networking if active; otherwise boot from external recovery media.
- Scan with reputable anti-malware:
- Microsoft Defender offline scan (fully updated signatures≥1.405.1230.0) automatically quarantines “Trojan:Win32/MyL1ttleR3d.A!MTB”.
- Malwarebytes 5.x (stage-full scan) removes dropped registry persistence in
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\SystemUpdate.
-
Clean lateral artifacts: remove scheduled task named
Win_SvcSync, remove hidden userSystemSync$, and revoke any newly created local admin accounts. - Review Group Policy / scheduled tasks—look for Powershell base64 blobs that reinfect.
- Re-patch hosts and finally reconnect to network behind firewall zones.
3. File Decryption & Recovery
- Decryption feasibility: Partially possible. The ransomware uses AES-256 in CBC mode with a per-file 32-byte key, then encrypts that key with ChaCha20-Poly1305 using an author-supplied 256-bit session key. Victims with offline backups, Shadow Copies**, or volume-level snapshots have full recovery minus downtime. Otherwise:
- Free decryptor: none. The author’s private key is NOT leaked or cracked as of 2024-06-12.
- Brute-forcing AES/ChaCha20 is mathematically infeasible.
- You can, however, salvage certain OPUS-encoded JPG/PNG files >10 MB if the original header block was not overwritten (use
PhotoRecv7.4 with “ carve first 2 MB only” mode). Expect ~5–7 % recoverability on photo sets. - Essential tools & patches:
- Microsoft Defender Offline (MDO) v1.405.1230.0 or later
- Kaspersky “Rakhnidecryptor” 2024-05-15 (tested—no support yet for this strain)
- ShadowExplorer v0.9 to restore from
System Volume Information - PaperCut & Ivanti vendor-specific patches referenced above
4. Other Critical Information
- Unique characteristics:
- Uses a persistent 32-byte hexadecimal string (instead of traditional brand name) as extension—likely a campaign identifier.
- Leverages Linux variants observed June 2024 on ESXi clusters (
vmdk.d2550a49bf52dfc23f2c013c5). - Tor payment site rotation
(ndjaskdhtoru4nye[.]onion)every 48 h to impede sink-hole tracking. - Broader impact:
- Hardest hit sectors: small-to-medium accounting firms, managed-service providers (MSPs), and county-level school systems in EU/NL.
- Demonstrates shift away from high-profile “brand” naming toward randomized strings to reduce Brandalyzer or Sentinel telemetry signatures.
- Impacts on cyber-insurers: recent claims in Q2 2024 up 31 % over Q1 from victims of d2550a49bf52dfc23f2c013c5.
Quick Reference Card (printable)
Before you panic:
1. Do NOT rename encrypted files—it helps no one.
2. Capture memory dump using Belkasoft Live RAM Capturer OFFLINE before rebooting for forensics.
3. Freeze backups: verify last backup date; begin restoration only after complete eradication.
4. Report incident: local CERT (US: CISA, EU: ENISA) and FBI IC3.
External Attribution
- BSI Germany Cyber-Sicherheitsüberwachung bulletin #2024-05-23-107
- Korea Internet & Security Agency (KISA) Advisory# 2024-03-A018
- Broadcom Symantec DeepSight note “SID33947519” (2024-05-19)
Stay secure—patch early, back up often, enable MFA, and never negotiate with criminal actors.