Ransomware Resource Sheet
Variant: “ds335” (extension .ds335)
TECHNICAL BREAKDOWN
1. File Extension & Renaming Patterns
-
Confirmed file extension:
.ds335(lowercase) is appended to every encrypted object; the original extension is NOT removed, e.g.Project.xlsx.ds335. -
Renaming convention:
<original_name>.<original_ext>.ds335– no e-mail, no random UID, no victim-ID prefix. -
Dropped marker files:
README_TO_RESTORE.txt(sometimesHOW_TO_DECRYPT.hta) is placed in every folder and the desktop. Inside you will find a 40-character “Client ID” plus a TOR chat link (http://ds335q倾倒恢复到xyz.onion– the exact string varies by sample).
2. Detection & Outbreak Timeline
- First public submissions: 18 August 2023 (Malware-Bazaar, Any.Run) – clustered under “Phobos-40474”.
- Rapid growth: September-October 2023 – most incidents reported via ID-Ransomware.
- Still active: Yes – new victims posted daily on Reddit/BleepingComputer through Q2-2024.
3. Primary Attack Vectors
Phobos-family malware (ds335 is one of its 100+ branded extensions) is almost exclusively human-operated:
- RDP brute-force / compromised credentials – #1 entry point (TCP-3389 exposed to Internet or via breached VPN).
- Smoking-phish attachments – ISO → LNK → BAT → payload (when RDP is not exposed).
- Pair-job with commodity loaders (SmokeLoader, Amadey) that are dropped by fake cracks/keygens.
- Lateral movement:
- Uses
SharpShares,NetScan,PSExec, andWMIC. - Attempts to disable Windows-Defender via
Set-MpPreferenceand deletes shadow copies withvssadmin delete shadows /all. - No SMB-EternalBlue exploit code has been observed in
ds335sessions to date; Post-exploit focus is credential-reuse, not 1-day bugs.
REMEDIATION & RECOVERY STRATEGIES
1. Prevention (stop the breach before encryption)
- Never expose RDP (3389) to the raw Internet. – Move it behind a VPN or use an RDP-gateway with 2FA/CAP.
- Enforce strong, unique passwords + lockout policy. Run a quarterly clean-up of local “ Administrators” group.
-
Disable SMBv1 (no Phobos sample needs it, but kill it anyway):
Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol - Keep OS + AV signatures fully patched; Phobos is routinely caught by Microsoft Defender once it drops – if Defender is still alive.
- Application control: Turn on Windows ASR rules and enable “Block Office apps from creating executable content.”
- Segment flat networks; block client-to-client 3389/445 at the L3 switch.
- Immutable/offline backups (3-2-1 rule). Make sure backup volumes are NOT addressable under the same credentials the support team uses daily.
2. Removal / Eradication (after you discover the beacon)
- Disconnect the NIC or power-off affected hosts to stop further encryption/lateral movement.
-
Collect evidence first: memory dump (
.vmem) +$MFT+Event-logs– useful later for IR and possible LE sharing. -
Boot a clean OS (WinPE / Linux LiveUSB) and:
a. Delete the malicious service (“service.exe” – random name in%ProgramData%\svcctrld\) + the persistence Run-key.
b. Remove any new user accounts the attacker added (often “MozillaUpdate”, “ServiceUser”). - Patch the entry vector – reset ALL admin/service passwords, revoke VPN sessions, inspect firewall rules the attacker created.
- Re-image the box or run a full AV scan while offline; then re-join domain only after you’re sure the network is clean.
3. File Decryption & Recovery
-
There is NO free decryptor. Phobos (
ds335) uses AES-256 in CBC mode (file key) encrypted by an RSA-2048 OAEP public key embedded in the binary. The matching private key is only on the criminals’ server. -
Paying the ransom (≈0.5-1.2 BTC, negotiable) does usually deliver a working decryptor, but:
– no guarantees,
– fuels future crime,
– may still leave backdoors behind. - Recovery path = backups. If no backups exist:
- Catalogue unencrypted copies (e-mail attachments, SharePoint on-line, shadow copies the attacker missed on non-primary drives).
- Use file-carving tools (
PhotoRec,RawCopy) to scrape partially overwritten VHD/VMDK blocks. - Note: “Phobos Decryptor” tools sold on YouTube/telegram are scams – do not pay for them.
4. Other Critical Information
-
Differentiator: Each Phobos campaign chooses a new 4-5 character extension (
ds335,ELDER,FOPRA…). Apart from branding, the code base is identical – treat every “new” extension as Phobos. -
No wiper behaviour – encryption only; skips
C:\Windowsand certain.exeto keep the OS bootable (so you can read the ransom note). - The TOR chat panel saves the victim’s personalised RSA private key only for ~30 days; after that the key is auto-purged – older victims report “payment page gone.”
- Law-enforcement partners: FBI, NCA, and EUROPOL have working relationships with Bitdefender/Coveware to negotiate if you must; involve them rather than talking to criminals directly.
Quick-reference Cheat-sheet
-
Indicators:
.ds335files +README_TO_RESTORE.txt+svcctrld\service.exewith a random 6-char name. - Logs to check: Event-ID 4625 (RDP brute), 7045 (service install), 4688 (process creation with command line).
- Block at perimeter: TCP-3389 from Internet, TCP-445 inbound from user VLANs, known malicious IPs: 5.199.162[.]220, 194.147.78[.]86, 92.118.36[.]164.
-
Recommended free tools:
– Bitdefender “PhobosDecryptor” (unfortunately still has no RSA keys; use for future hope),
– Coveware’s Phobos report portal (upload ransom note for campaign attribution),
– Microsoft’s “Azure Backup” or “Windows Server Backup” to an encrypted, network-detached VHDX.
Stay calm, isolate, rebuild from clean backups, and involve professionals if business-critical systems are affected. Good luck, and safe computing!