THREAT INTEL BRIEF – Ransomware Family: “EFJI”
(Files encrypted / renamed with the final extension “.efji”)
TECHNICAL BREAKDOWN
1. File Extension & Renaming Patterns
-
Confirmed extension:
.efji(always lower-case, appended LAST) -
Typical renaming convention:
OriginalFileName.ext → OriginalFileName.ext.efji - The malware keeps the original file name and simply adds the new suffix.
- Large files (>150 MB) are only partially encrypted (first/last 12 MB each) to speed-up the job yet still render files unusable.
2. Detection & Outbreak Timeline
- First publicly reported sightings: ≈ 19 Dec 2020 (campaigns peaking Jan–Feb 2021).
- Still circulating through “big-game” affiliate clusters as of Q2-2024.
3. Primary Attack Vectors
EFJI belongs to the STOP/Djvu RaaS (Ransomware-as-a-Service) pool—one of the most abused consumer-grade strains.
Recent telemetry shows the following propagation mixes:
| Vector | Details |
|——–|———|
| a. Bundle/Keygen installer | Masquerades as game cracks, Photoshop/Office keygens, Windows activation tools (“KMS”) delivered via torrent or file-hosting sites. |
| b. Malvertising & fake updaters | Pop-ups pushing “Flash-Player update”, “Chromium patch”, or “Zoom fix” (CF-captcha gate → fake-Update.exe). |
| c. Exploit kits | Very rare now, but RIG/GrandSoft being re-armed with Djvu payloads when web-server-side compromise occurs. |
| d. Supply-chain/P2P | Bundled with pirated game launchers (Minecraft, Fortnite). |
| e. Second-stage dropper | Some samples arrive after downloader trojans (Vidar/Amadey/Fickerstash) that were initially installed by phishing RAR archives containing JS/HTA/LNK. |
REMEDIATION & RECOVERY STRATEGIES
1. Prevention
1) Stop software piracy inside the org. – >70 % EFJI infections trace to running game or Adobe cracks.
2) Control removable media via GPO; autoplay disabled.
3) Application whitelisting (Windows Defender Application Control / AppLocker) – block %LOCALAPPDATA%\Temp\*.exe and %APPDATA%\<random>\<random>.exe – the two standard Djvu drop-points.
4) Patch everything, especially browser and doc-viewers, so malvertising redirects cannot exploit old CVEs.
5) E-Mail filter: mark any archive with double-extension (“.jpg.exe”) AND with password protected ZIP as high-risk.
6) Robust backup regimen: 3-2-1 rule; at least one copy offline (not addressable from the infected PC).
7) Disable macro v4 for Office; leave “Block Office communication to web” in Attack Surface Reduction rules turned ON.
8) Turn on Tamper Protection for Windows Defender & cloud-delivered protection level “High”.
2. Removal (step-by-step)
1) Physically disconnect from network (unplug cable/Wi-Fi).
2) Boot into Safe Mode with Networking (or Windows Recovery → Command Prompt).
3) Identify & kill rogue process (usually %APPDATA%\{random}\{random}.exe):
- Launch “Autoruns” (MS-Sysinternals) → uncheck / delete malicious entry.
- In Task Manager kill the same EXE; if access denied → use Process Explorer → suspend → kill.
4) Delete the persistence folder.
5) Clean scheduled tasks → look for entries named “Time Trigger Task”, “Opera Scheduled Autoupdate …” etc.; remove any pointing to%APPDATA%.
6) Run a full AV scan with an engine that contains STOP/Djvu signatures (Windows Defender ≥ 1.353.x, ESET, Kaspersky, Sophos, Malwarebytes).
7) Very important: manually delete the “SystemID” file and “PersonalID.txt” the malware places inC:\SystemID&%WINDIR%– these artefacts confuse decryptors if left behind.
8) If MBR/VBR altered (rare) – runbootrec /fixmbr,bootrec /fixboot.
9) Check for secondary payloads (frequently drops data-stealer AZORult or RedLine) – inspect%TEMP%,C:\Users\Public.
10) Before letting the machine back on LAN, verify no “efji” process is running AND that outbound C2 IP185.220.x.xrange is not reachable.
3. File Decryption & Recovery
- Likelihood of decryption WITHOUT payment:
- Partial → YES for some victims.
- Full → NO if “online encryption” was used (malware was able to phone home → unique RSA-2048 per victim).
Important discriminator:
-
PersonalID.txtcontains ONE 40-char ID starting with “t1” or “032” → offline key; chance >0. - File has >1 ID or IDs with 38–39 random chars → online key; decrypt odds ≈ 0.
Toolset (free)
- Emsisoft Stop/Djvu Decryptor – download latest, run with admin.
- Automatically imports
OFFLINE-KEYS.TXT(currently ~200 keys). - Works only for extensions whose master key was released (EFJI key was donated by
_gridinsoft07 May 2021, so give it a try!). - elektraLecture’s
stopOfflineCheck.py– quickly tells you if the sample used offline key by scanning C2 beacon in the ransom note. -
ShadowExplorer – see whether
vssadmin delete shadows /allwas skipped. - PhotoRec / TestDisk – carve raw media files if disk has TRIM-disabled SSD or magnetics.
When Emsisoft fails → do not pay unless business-critical; Djvu operators demand US $490 (in 72 h) → $980; payment reliability is ~75 % but fuels crime. Buy clean drives, rebuild OS, restore from offline backup.
4. Other Critical Information
a. Differentiators
- Bundles the small installer “1.exe” (≈ 650 kB NSIS) that writes two main DLLs (
update.dll,update_win.dll) – they really are X25519 + Salsa20 crypto libs. - Unlike ID-Ransomware clones, EFJI ransom note (_readme.txt) contains the string
ATTENTION!,0210ViY2c1G7q5UICwE3Jm1e2Rpz, and always has two support e-mails (currently[email protected]/[email protected]). - Adds exclusion rule for Windows Defender right before encryption to avoid high I/O interception:
powershell -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath C:\. - Drops the “update.exe” module that later installs Corona-Info Trojan and cookie stealer → assume credential breach & force-reset all saved passwords.
b. Broader Impact
- STOP/Djvu (and therefore EFJI) accounts for >55 % of ransomware submissions to ID-Ransomware in 2023, making it the statistically dominant consumer strain.
- Average enterprise downtime reported to Coveware for STOP-incidents: 1.0 day (short, because files seldom decrypt → orgs rebuild from backup).
- Even though ransom sums are “small”, volume is high; affiliate criminals still net estimated US $5–7 M per quarter.
- Secondary infostealer infection often precedes business-e-mail-compromise months later; security teams should correlate any later BEC tickets with the date of the EFJI outbreak.
CHECKLIST (printable)
☐ Isolate → ☐ Kill process → ☐ Delete persistence → ☐ Run AV → ☐ Check “PersonalID.txt” → ☐ Try Emsisoft decrypter → ☐ Report to law-enforcement (FBI IC3 / national CERT) → ☐ Re-image or restore from BACKUP → ☐ Reset passwords & review logs for exfil → ☐ Harden against piracy vectors.
Stay safe, patch early, backup often, and never run “cracks” on production machines. Good luck recovering from EFJI!