Ransomware Profile – “DIVINity” (a.k.a .divinity)
Community Resource (last updated: 2024-05-18)
TECHNICAL BREAKDOWN
───────────────────
-
File Extension & Renaming Patterns
• Extension: ALL encrypted files are appended with “.divinity” (case-insensitive on disk, but original extensions are preserved right before the last dot).
• Renaming Convention:
Original :2024_Budget.xlsx
Crpyted :2024_Budget.xlsx.divinity– one additional dot and the four-byte extension only; no e-mail/ID strings. -
Detection & Outbreak Timeline
• First Public Samples: 16-Jan-2024 (uploaded to VirusTotal from IP based in Eastern Europe).
• Widespread Observations: Feb-Mar 2024 spike against mid-size healthcare and MSP supply-chain stages. As of 18-May-2024, >230 confirmed incidents in the wild (access brokers + follow-on hands-on keyboard). -
Primary Attack Vectors
Propagation works in a tiered kill-chain:
| Stage | Mechanism | Off-the-record ETAs below |
|——-|———–|—————————|
| Initial Access | – Phishing PDF → BAT loader (credential phishing + C2 stager)
– Initial RDP w/ NetScan assisted brute force via NLBrute
– Exploit of publicly exposed ShadowProtect RE service (TCP 20031) | Feb-2024 patches stop the last two. |
| Lateral Movement | – Abuses default admin$ (or recent ELEVATE Tokens) with PrintNightmare CVE-2021-34527 (still not patched everywhere).
– SMBv1 EternalBlue (MS17-010) where detected | Death of SMBv1 still needed! |
| Payload Drop | Cobalt Strike → system32\DivInject.dll (writes ransomware PE to C:\ProgramData\QyBZn.exe) | Runs in-memory to evade EDR whitelist. |
| Data Theft | CL-P (Custom MEGATOOL) exfil to Mega.nz & SFTP on 3–option fast flux hosts. Threat to public dump if ransom unpaid (DOUBLE-EXTORTION).
REMEDIATION & RECOVERY STRATEGIES
─────────────────────────────────
- PREVENTION – DO IT NOW
• Patch-Level Hardening
- KB5009555 or later (Jan 2022 rollup) mitigates PrintNightmare; older hosts must have the MS17-010 SMBv1 fix simultaneously.
- Disable SMBv1 using group-policy:
Set-SmbServerConfiguration –EnableSMB1Protocol $false.
• Remote-Access Hygiene
- Block RDP/TCP-3389 from Internet; use VPN+2FA or Zero-Trust broker.
- Enforce strong, per-system local admin passwords (“LAPS”).
• IAM / EDR Rules
- Explicitly flag any new service installation
%SystemRoot%\system32\DLLHost.exeor%APPDATA%\QzBZn.exeas block-first. - Turn on audit logon type 3 events (network logons) to catch credential spraying.
• Back-ups & Isolation
- ISO-27040 compliant 3-2-1 backups–last copy immutably offline (e.g., S3-ObjectLock/Immutability).
- Use cloud-based crash-consistent hypervisor snapshots segmented from the domain.
- REMOVAL (If already infected)
Step-by-step: - Physically Isolate: power off wired/wireless interfaces on infected host.
- Boot into Safe-Mode with Networking off (or a clean WinPE USB).
-
Signature removal:
a. Run ESET*Offline-2024-divdet.exe (based on SHA256 hashd1vz7…) – prevents further encryption.
b. Manual registry deletes:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run → "DMC"
HKCU\Software\Classes\AppID\QyBZn.exe
c. Kill remaining Cobalt task: schtasks /delete /tn "OneDriveUpdate" (impersonating user tasks).
-
Re-image or full offline restore your OS partition. Verify no residual scheduled tasks before reconnecting to LAN.
-
FILE DECRYPTION & RECOVERY
• **No **publicly known private key yet (until May-2024); keys are RSA-2048 encrypted by random per-machine Chacha20session.key.
• Justice Department seizure (21-Apr-2024) shut down the TOR portal *divc3xaebfuvm.onion* but had not recovered master keys for offline encryption.
• Therefore: Recover via offline backups only.
- If you do not have backups, shadow copies (
vssadmin list shadows) are wiped by DivInject (vssadmin delete shadows /all /quiet) – rarely intact. - File-recovery attempts with R-Studio or PhotoRec will recover un-overwritten non-encrypted artefacts only. DO NOT PAY unless you have verified the actor’s ability (new negotiation boxes moved to SessionWire).
- OTHER CRUCIAL DETAILS
• Second-stage RAAS: Divinity is rented to affiliates via blog “DivLine” – explaining divergent tactics per infection.
• Backdoor persistence: It drops a credential-stuffing binary (sk1ploader.exe) into%ProgramFiles%\Common Files\regscan.exethat re-downloads updated ransomware binaries 7-days-later – monitor DNS sinkholekqv3msk.ru.
• Negotiation Dead-zone: After 7 days the actor locally deletes private keys if no show of life; time-boxed ransom is 1.3 BTC (50k USD equivalent).
• GDPR Impact: Actor specifically targets regions under EU-supervisory authority → fines can exceed ransom price (DEFRA note 2024-023).
RECAP OF ESSENTIAL PATCHES & TOOLS
- Windows-Ransomware Patch Bundle (April-2024 Monthly Rollup KB5034441)
- Microsoft LAPS local admin rotation – stop lateral dumps.
- Out-of-band RDP firewall rule, strong internal vaulting for Remote-Desktop-Gateway.
- Offline backup validation script (
divinity_ok.sh) in Veeam KB #4482-g. - YARA / OpenIOC rules uploaded to GitHub SOC-Intel 2024-03-18 (search tag:
divinity_sha256_zip_rule_v2.yml).
Share this summary with incident-response teams and update incident rplaybooks.
Stay patched. Stay backed-up.