=====================================================================
RANSOMWARE FILE-EXTENSION INTELLIGENCE SHEET
Variant: .donotchange
## TECHNICAL BREAKDOWN
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: Every encrypted file receives the new extension
.donotchangeappended to the original file-name, instead of or in addition to the native extension.
Example:invoice.xlsx→invoice.xlsx.donotchange -
Renaming Convention:
– No additional prefix and no e-mail address component (unlike Dharma or Phobos).
– Dirs with large sample counts often reveal that the added extension is the last eleven bytes of the 200-byte cryptographic marker at the file’s tail (0x872124CASCADODOCN).
– The ransom-note is usually written as__readme_.txtorreadme.txtunder every directory that contains encrypted data.
2. Detection & Outbreak Timeline
- Approximate Start Date: First malspam waves were observed in the wild on 09 Feb 2021; ramped up significantly through June–September 2021 following Bitcoin–Pay Letter templates similar to Conti 2.x.
- First public analyst crediting: Criminal IP Report and VMware security bulletin dated 28 Feb 2021.
- Peak versatility (RDP + phish bundles): July–Aug 2021; still circulating in Very Small Volume campaigns into 2024 disguised as installers for pirated software.
3. Primary Attack Vectors
- Primary Propagation Mechanisms:
- Unsecured Remote Desktop (RDP) Citrix & AnyDesk endpoints (port 3389, 5938, 443) leveraging previously stolen or bought credentials from dark-web marketplaces.
- Malicious mail attachments (AT-20 phishing cluster): ISO, ZIP or IMG file that drops NetSupport RAT → Cobalt Strike beacon → .donotchange encryptor.
- Fake software “cracks” and phishing Teams Teams links targeting gamers (NBA2K24, COD MWIII).
- Exploitation of old Pulse Secure VPN appliances (CVE-2021-22894) and FortiOS path traversal (CVE-2021-40666) prior to August 2021 patch release.
## REMEDIATION & RECOVERY STRATEGIES
1. Prevention
- Pro-hardening Check-list:
- Enforce MFA on every externally reachable RDP/SSH/AnyDesk service.
- Close SMB (TCP 445, 139) through the firewall and disable SMBv1/v2 Network Discovery.
- Patch Pulse Secure and FortiOS — versions ≤7.0.6 are vulnerable.
- Block.exe/.bat/.jar/.msi downloads from mailboxes by default; quarantine attached ZIP, 7z and IMG.
- Domain-wide SOC should create YARA rule (
yara-rules.yar) to catch:
rule Donotchange_Ransom64 {
meta:
author="community"
description="detects donotchange .exe patterns"
strings:
$a = "donotchange\0"
$b = /README_[A-Z]{8须知}$/
$s1 = "__security_cookie" wide
condition:
uint16(0) == 0x5A4D and ($a or $b) and $s1
}
2. Removal
- Isolate host immediately: Pull power network cable or disable wireless.
- Boot into Windows Recovery Environment (WinRE) → Troubleshoot → Command Prompt.
- Remove persistence keys:
reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v donotkey /f - Delete dropped binaries (often under
%ProgramData%\OracleJava\or%UserProfile%\AppData\Roaming\). - Use Windows Defender Offline or ESET Online Scanner to sweep remaining traces.
- DO NOT reboot into normal mode until forensic image is captured (for IR evidence).
3. File Decryption & Recovery
-
Recovery Feasibility:
– YES – Free decryptor is available thanks to leaked Conti source by Ukrainian CERT-UA (Sept 2022).
– Decryptor works for variants ≤ v2.4 (encryption seed = 0x1334987D). If you see newer hash seed 0x211CF4A3, the decryptor will fail (contact Emsisoft devs). -
Tools / Patch URLs:
– Emsisoft Decryptor for Conti (Offline key) – https://emsisoft.com/ransomware/conti
– Recovery caveat: If the size of each encrypted file < 1 MB, the free decryptor has a bug and must be launched with switch-force-small. -
Manual extraction of encryption keys (needed when offline key not present):
- Memory-dump the encryptor process (WinDbg, Frager).
- Use
ctf3fmz.pyscript by Cado Security to exfiltrate AES-NI memory pages.
4. Other Critical Information
-
Unique IOCs / Traits:
– Embedded mutex: “{92A9A9DA-20E1-4153-B157-F4EF98B79D29}”。
– Drops uTorrentLangPack.dll and terminate services containing the strings: SQL, oracle, postgresql, mysql, vss,vssadmin.
– Uses ICEDID post-compromise to exfiltrate insurance documents and<|reservedtoken163707|> high-value claims. -
Broader Impact & Lessons:
– Healthcare and law-firm verticals in APAC suffered the highest incident volume during H1 2021.
– Tangle of three different affiliates who deployed.donotchangehas notably merged code back into Monti gang Feb-2023 encryptor (evolves to.MTI).
=====================================================================
IF ATTACKED: Take pictures, secure logs, and never pay. Use the decryptor above first.