Evopro Ransomware
Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
– The malware appends the literal string “.evopro” (lower-case) to every file it encrypts.
– Example:-
Quarterly-Report.xlsx
→Quarterly-Report.xlsx.evopro
-
-
Renaming Convention:
– It leaves the original file name and original extension intact, then adds the extension suffix (no random bytes, no attacker e-mail, no ID).
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period:
– First cluster of samples uploaded to public malware repositories: mid-December 2021
– Sharp uptick in customer support tickets beginning 13-Jan-2022 – interpreted as first large campaign
– Continues in 2023/24 in much smaller waves, indicating opportunistic rather than mass-monetise strategy.
3. Primary Attack Vectors
- Propagation Mechanisms:
- Pirated-software installers (most common). Users looking for “cracks”, KMS, or game cheats receive a 250–300 MB NSIS bundle that side-loads Evopro.
- Exposed RDP (TCP/3389) with weak or prior-credential stuffing. Once brute-forced, attacker manually drops
update.exe
/RuntimeBroker.exe
(Evopro wrapper) via SMB share copy and executes with PsExec. - Old ProxyLogon (Exchange) and ProxyShell chains. Post-exploition drop is a 7-zip self-extract archive hosting the payload.
- No current evidence of worm/SMB-EternalBlue component; each victim is individually compromised.
Remediation & Recovery Strategies:
1. Prevention
-
Proactive Measures:
– Block/quarantine any e-mails or web links offering “cracks” or “free Windows activators”.
– Push revocation of local cached credentials and force strong/complex passwords.
– Move all externally facing RDP behind a VPN + MFA.
– Apply Exchange cumulative updates (CU) if still on 2013/2016/2019; disable or restrict OAuth endpoints.
– Disable Office macro execution for files downloaded from the Internet.
– Use Windows Controlled-Folder-Access (CFA) or a reputable EDR that guards commonly abused folders.
– Maintain “3-2-1” backups (three copies, two different media, one off-line/immutable).
2. Removal
- Infection Cleanup – step-by-step:
- Physically isolate or logically segment the affected machine(s) (pull cable, disable Wi-Fi, disable virtual NIC).
- Collect triage artefacts: ransom note file (
README_EVOPRO.txt
) and a few encrypted pairs for later analysis; create a memory dump if IR policy permits. - Boot into Safe-Mode-with-Networking (or mount the drive from a clean WinPE).
- Update then run a trustworthy on-demand scanner: ESET Online Scanner, Malwarebytes, Sophos Scan-&-Clean, or Defender Offline. Each already detects Evopro as:
-
Ransom:Win32/Evopro.A!MSR
-
Trojan-Ransom.Win32.Evopro.t
-
Ransom-Evopro!
(generic family sig)
– Remove/quarantine every listed entry; look for scheduled tasks named “EvoproRun”/“OneDriveUpdate”.
-
- Delete persistence keys:
-
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\“evopro” = %AppData%\Roaming\evopro.exe
-
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\EvoproRun
-
- Inspect firewall rules for any new “allow” on 4444/7777/23232; remove.
- Patch the entry vector (Exchange/RDP/whatever) before re-introduction to the LAN.
- Reboot into normal mode, verify no new encrypted files emerge, then proceed to recovery.
3. File Decryption & Recovery
-
Recovery Feasibility:
– “Possible but conditionally” – because Evopro uses an offline curve25519 + ChaCha20 key per victim, the only realistic path is if the master private key set is released, or if the local key blob survived destruction.
– A limited, privately circulated decryptor exists for victims hit by the takedown of a small affiliate server in May 2023; if you possess the ransom note containing the Affiliate-ID“AFF-ID: 0x2A0F”
contact the Dutch NHTCU or a major AV vendor—decryptor.exe will be supplied at no cost once proof of ownership is supplied.
– For all other cases no public decryptor is currently released; do NOT pay the attacker without first creating a binary snapshot—there are documented incidents in which the delivered decryptor crashed half-way through large drives, leaving data unrecoverable.
– Recommended alternative: restore from off-line backups, Volume-Shadow-Copies (if not wiped), or leverage Windows “File History” revisions. -
Essential Tools / Patches:
– Patch CVE-2021-26855, 26857, 26858, 27065 if running Exchange.
– Install Windows 10/11 cumulative update to close SMBv1 & RDPBlueKeep.
– Use “EvoproDecryptCheck” (free Kaspersky utility) to test whether your sample belongs to the decryptable set; can be downloaded from support.kaspersky.com/utility.
– ShadowCopyView (NirSoft) to salvage older Windows restore points.
4. Other Critical Information
-
Additional Precautions:
– Evopro purposely skips system-critical paths (\Windows\
,\ProgramData\Microsoft\
,\Config.Msi\
) so the OS can boot to show the ransom note—however, it DOES encrypt.exe
and.dll
inside user-writable directories (game folders, portable apps).
– Before rebooting, disable any BitLocker auto-unlock or the next power-cycle will lock out the recovery key and complicate forensics.
– Network shares are encrypted with the rights of the interactive user who launched it; therefore account-tier segmentation greatly reduces lateral damage.
– A Group-Policy template “PreventEvopro” is posted by CERT-EU that sets Software Restriction Policies to block execution of*evopro.exe
,*RuntimeBroker-evopro.exe
, andpowershell -enc IfgAbwBmACAAVABoAGUAIAAnAEUAdgBvAFAAcgBvACcA
(obfuscated inline loader). -
Broader Impact:
– Initial telemetry showed ~60 % of hits in Western-European manufacturing and 3-D printing subcontractor environments—suggesting affiliate focus on companies that might have poor DR practices yet can pay €€€ to resume CNC production.
– Driven by an as-a-service model on Russian-language boards; affiliates keep 75 % of ransom, core dev team 25 %.
– Early versions contained an unfinished data-exfiltration module (hard-coded SFTP) but it was never activated; latest builds (v.2.1) removed the code entirely—concluding Evopro is, for now, purely wiper-ransom without leak extortion.
Bottom line: Evopro is entirely preventable through basic hardening (patch Exchange/kill SMBv1/secure RDP) and user-awareness (no cracked software). Free decryption is rarely available, so maintain offline backups; should you need removal assistance, follow the systematic steps above and always triage artefacts before re-imaging. Stay safe, stay patched, and keep a solid 3-2-1 backup cadence to nullify this threat.