Ransomware Resource: “.fcp” (alias “File Creep”)
Technical Breakdown
1. File Extension & Renaming Patterns
- Extension confirmed: “.fcp” (lower-case, appended with no space).
-
Renaming convention:
Original path →photo.jpg → photo.jpg.fcp
One iteration has been reported where folders receive an extra “LOCKED-” prefix (e.g.,C:\Users\Finance
) becomeC:\Users\LOCKED-Finance
) but this behaviour is inconsistent.
2. Detection & Outbreak Timeline
- First public submission: 2023-11-18 (ID-Ransomware & MalwareHunterTeam).
- Active cluster spotted in Western-Europe & North-America Q1-2024.
- Spike again in late-May 2024 following a phishing campaign masquerading as “QuickBooks update”.
3. Primary Attack Vectors
-
Spear-phishing e-mails carrying ISO/IMG or password-protected ZIP.
– Lures: invoices, IRS forms, purchase-orders (English & Spanish).
– Attachment executes a .NET loader that side-loads a renamedRclone.exe
to pull “fcp-payload.exe”. -
RDP brute-force / credential stuffing (TCP-3389 exposed to Internet).
– After breach, attacker drops “fcp.exe” intoC:\PerfLogs\
and runs with –netspread flag. - EternalBlue (MS17-010) & BlueKeep (CVE-2019-0708) still used on neglected networks.
- Drives-by via fake browser-update pages (Fake-It, SocGholish framework) ultimately dropping the same .NET loader above.
Remediation & Recovery Strategies
1. Prevention
- Disable RDP from the Internet or wrap in VPN + MFA.
- Patch Windows endpoints: MS17-010, CVE-2019-0708, and CVE-2023-36884 exploited by dropper during chain.
- Remove script-hosting risks: *.iso, *.img, *.js, *.wsf default-open via explorer.
- Configure Microsoft Defender to block credential-theft tools by enabling “Block credential stealing from the Windows local security authority subsystem (lsass.exe)” (Attack Surface Reduction rule).
- Mail-gateway filters: quarantine externals with macro-container or password-protected archives.
- Deploy rigorous application whitelisting (Applocker / WDAC) – primary sample is not signed with a trusted cert.
- Use local-only admin accounts; restrict lateral movement with tiered privileges and Ransomware-CIS Benchmark.
2. Removal
1) Isolate the machine(s) – pull cable, disable Wi-Fi and Bluetooth.
2) Collect volatile evidence (RAM dump) only if forensics is required; otherwise proceed.
3) Boot into Safe-Mode (or attach disk to clean box).
4) Run current AV/EDR signature update (Windows Defender detections: Ransom:Win32/Fcp.A!bit, Ransom:Win64/Fcp.S), allow full remediation.
5) Delete artefacts created under:
– C:\PerfLogs\fcp.exe
– %PUBLIC%\Libraries\version.dll
(side-load helper)
– Run-keys HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fcpSvc = "C:\PerfLogs\fcp.exe"
6) Clear Volume-Shadow duplicates (ransomware removes them but some are often missed); do NOT run vssadmin delete
unless you have already confirmed no clean restore points remain.
7) Reboot and re-scan to confirm removal.
8) Patch + harden (see prevention) before restoring data.
3. File Decryption & Recovery
- No flaw yet found – the malware uses Curve25519 + AES-256-GCM with per-victim keys exchanged to attacker-controlled TOR hidden-service. Private key is never present on disk.
- Decryption therefore possible only with the gang’s private key (no free decryptor as of 2024-06-01).
-
Work-arounds that CAN work:
– Restore clean, offline backups (verify integrity + scan first).
– Look for “ghost” VSS copies the malware missed (vssadmin list shadows
).
– Inspect cloud-sync folders (OneDrive, Google-Drive) for version history.
– Check MFT for extremely large files that the encryptor skipped based on extension / size threshold (>2 GB for video files in analysed sample). - Do not pay until legal/compliance team signs off – decryption tool delivered by actor is slow (single-threaded) and may skip damaged/encrypted executables.
- Data-recovery firms that advertise “guaranteed unlock” are simply paying the ransom on your behalf in >95 % of verified “.fcp” cases.
4. Other Critical Information
- Persistence is trivial (Run-key) but the locker itself exits post-encryption; watch for partner Trojans (Amadey, Smoke-Loader) that remain for data-exfil prior to encryption (“double-extortion”).
- Leaves ransom-note “README-FCP.txt” & “README-FCP.hta” in every encrypted directory:
– Victim-ID is 40-char hex after the line “YOUR KEY IS:”.
– Payment page: hxxp://fcpblog6xdc6mvm5[.]onion/{VICTIM-ID} (live until payments cease). - Observed data-staging folder
C:\Users\Public\fireart\
in nearly every incident; check for live C2 traffic to AWS S3 buckets (user-agent string “aws-cli/2.13.0”). - No wiper functionality – encrypted data is recoverable if you have corresponding keys.
- Multiple languages in ransom-note (EN, ES, FR) suggesting widening targets.
- Attribution: overlaps with “Professor” cluster (Russian-speaking forum ads, Kotlin-built panels) but no definitive verdict yet.
Bottom Line
.fcp is a straightforward but competent double-extortion family. Defence succeeds through the usual triumvirate of inbox hygiene, external-surface hardening (RDP, VPN), and rigorous offline backups verified and guarded against both deletion and encryption. Clean-up is painless if you isolate promptly, but decryption without the criminal’s private key is presently impossible—so restore from backups, rebuild if needed, and vigilantly patch/monitor afterwards.