eebn Ransomware – Community Resource Sheet
(Version 1.0 – compiled May 2024)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmed extension:
.eebn(lower-case, four letters) - Renaming convention:
- Original file
report.xlsx→report.xlsx.eebn - No email address or victim-ID is inserted between the original name and the new extension
- The root filename is left untouched; only the extra suffix is added. This makes quick triage with PowerShell or
findeasy:
Get-ChildItem -Recurse -Filter '*.eebn' | measure
2. Detection & Outbreak Timeline
-
First submissions to public malware repositories: 17 Nov 2023 (Hash:
SHA-256: 5d38…f1c9) - Visible uptick in ID-Ransomware uploads & support-forum posts: 20-24 Nov 2023 (Turkey, Brazil, U.S. MSPs)
- Still circulating as of May 2024 – primarily via cracked-software bundles and exposed RDP.
3. Primary Attack Vectors
- Fake “cracked” software installers (Adobe, Fortnite, Windows activators) delivered through:
- YouTube “how-to” videos with bit.ly/anonfiles links
- Discord CDN attachments
-
MSSQL & RDP brute-force → manual deployment (observed ports 1433/tcp, 3389/tcp brute-forced from
193.56.*.*) -
Pirated game “mod-packs” that silently side-load
eebn.dll(first stage) - No signs of worm-like SMB/EternalBlue exploitation; lateral movement is manual via PAExec/RDP once the attacker owns one workstation.
Remediation & Recovery Strategies
1. Prevention
- Disable RDP from the Internet or wrap it in a TLS-VPN with MFA; enforce account-lockout policies.
- Remove local Administrators from “Log on through RDP” rights—use a separate, monitored “RDP-Users” group.
- Patch MS SQL, remove unnecessary xp_cmdshell, enforce strong sa-passwords.
- Application whitelisting / Windows Defender Application Control (WDAC) stops the unsigned
eebn.exe/eebn.dlldroppers. - Macro & attachment filtering in e-mail is less relevant for this family, but keep it anyway.
- Maintain offline, password-protected backups (3-2-1 rule).
2. Removal / Clean-up
| Stage | What to do |
|——-|————|
| a. Contain | Physically disconnect or disable Wi-Fi; power-off non-essential machines to prevent further encryption. |
| b. Identify | Collect the ransom note (_readme.txt) and one .eebn sample → upload to ID-Ransomware (confirms variant). |
| c. IOC hunt | Check for: C:\Users\Public\eebn.exe, C:\ProgramData\syshelper.dll, run keys HKCU\Software\Microsoft\Windows\CurrentVersion\Run\syshelper, Scheduled Task \Microsoft\Windows\Dgthrsvc. |
| d. Collect logs | Export EVTX, MFT, and NTFS $LogFile before any clean-up – may help DFIR or free decryptor later. |
| e. Kill & delete | Boot into Safe Mode + Networking → run Defender full scan or a reputable AV (ESET, Kaspersky, Sophos) – all flag the family as Trojan-Ransom.StopCrypt. |
| f. Patch & harden | Change all local/domain passwords, apply OS & SQL patches, remove rogue RDP wrappers. |
3. File Decryption & Recovery
- STOP/Djvu derivative: encrypts with OFFLINE or ONLINE keys.
-
OFFLINE-key infections (no Internet during install OR server returned
err=1) can be decrypted with the free Emsisoft STOPDecrypter (now integrated into “Emsisoft Decryptor for STOP Djvu”). - Drop any pair of original + encrypted file (e.g., from backup or e-mail attachment) into the decryptor; if it reports “Your ID ends in ‘t1’ ⇒ OFFLINE key”, you are eligible.
- ONLINE-key infections (vast majority since Dec 2023) cannot be decrypted without the private key held by the attacker. Options:
- Restore from local Volume Shadow Copy (it deletes them via
vssadmin delete shadows /all, but sometimes misses secondary drives). - Restore from offline backups.
- File-carving / photo-recovery if disk was HDD and not SSD/TRIM’d (partial success for multimedia).
- Paying the ransom ($199-$999 in Bitcoin) is discouraged – no guarantee, funds criminal ecosystem, and your machine remains compromised.
4. Essential Tools / Patches
- Emsisoft Decryptor for STOP Djvu (update every few weeks)
- Kaspersky RakhniDecryptor (handles some older STOP branches)
- Microsoft “HealthCheck” to disable SMBv1 if still enabled
- CISA Ransomware “StopRansomware” playbook (PDF)
- PowerShell script “StopResetTool.ps1” to clean malicious scheduled tasks
Other Critical Information
- Family attribution: eebn = latest strain of STOP/Djvu, first seen in 2018 but still under active development (≈600 new variants).
- Ransom note (
_readme.txt) template unchanged since 2021: offers 50% discount if contacted within 72 h, addresses[email protected]&[email protected]. - Uses both Salsa20 symmetric key + RSA-2040 offline/online public key – fast encryption, low CPU footprint.
- Deletes shadow copies, disables Windows Error recovery, and adds exclusion to Microsoft Defender to evade real-time blocks.
- Noteworthy quirks:
– Encrypts files < 5 MB completely; only first 5 MB of larger files ⇒ some video/VM images may be partially recoverable.
– Skips folders::\Windows,:\$Recycle.Bin, browser profiles (keeps browser working so victim can pay). - Broader impact: ~23% of ransomware submissions to ID-Ransomware in Dec 2023 were STOP/Djvu variants (eebn, aayu, aamm, etc.). Hit home users/backups of MSPs hardest.
TL;DR Quick Reference
- See
.eebn→ isolate, collect_readme.txt, head to https://id-ransomware.malwarehunterteam.com. - If result = OFFLINE key → use Emsisoft Decryptor.
- If result = ONLINE key → restore from backups or shadow copies; no commercial decryption exists.
- Clean the box with current AV, secure RDP & SQL, patch, keep 3-2-1 backups.
Stay safe, patch early, backup often, and don’t pirate software—eebn usually rides in with it.