Ransomware Resource Sheet
Variant identified by extension: .filegofprencrp
TECHNICAL BREAKDOWN
1. File Extension & Renaming Patterns
-
Confirmation of file extension:
Every encrypted file receives a second, final extension “.filegofprencrp” (lower-case).
Example:Budget2024.xlsx.filegofprencrp
-
Renaming convention:
No e-mail, campaign ID, or victim key is inserted; the original name is preserved and only the extra 14-character extension is appended.
Folders obtain a plain-text ransom noteREADME_TO_RESTORE_FILES.txt
(sometimesHow_to_back_files.hta
on Windows).
2. Detection & Outbreak Timeline
-
First submitted sample: 2023-10-17 (MalwareBazaar, ID
5c6ad…fb11
). - Wider telemetry spike: 2023-11 through 2024-02, clusters in North-America and Central-Europe.
- Still circulating in 2024; small-volume, high-value targeting rather than mass spam waves.
3. Primary Attack Vectors
- RDP / VPS brute-forcing – most frequently observed entry (TCP-3389 open to Internet; weak or reused credentials).
- Phishing with ISO→LNK containers (“DHL shipment” theme) delivering initial PowerShell stager.
- Exploitation of un-patched Atlassian Confluence (CVE-2022-26134, CVE-2023-22515) and occasionally Log4Shell (CVE-2021-44228) on public-facing Java stacks.
- Lateral movement with Impacket’s wmiexec / SMBExec; once domain-admin is obtained, the binary is pushed via
PsExec.exe -s -c filegofprencrp.exe
to dozens of hosts.
REMEDIATION & RECOVERY STRATEGIES
1. PREVENTION
- Close RDP to the Internet or put it behind a VPN + MFA (good practice for ANY ransomware).
- Apply the latest patches—Confluence, Log4j, Windows (especially SMB, Print-Spooler, and Netlogon fixes).
- Use LAPS for local admin passwords; disable “Administrator” and “admin” completely.
- Segment flat networks; block client-to-client SMB 445/139 at the switch level.
- Enable Windows AMSI, Controlled-Folder-Access (CFA), and ASR rules
92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b
&5beb7efe-fd9a-4556-801d-275e5ffc04cc
. - Back-up 3-2-1 (offline, immutable, tested). Rotate keys in Veeam/AWS/Azure immutable buckets.
2. REMOVAL / INFECTION CLEAN-UP
- Physically isolate or shut down the infected host(s), but do NOT power-off domain controllers before imaging if forensics is required.
- Collect volatile artefacts (process dump of
filegofprencrp.exe
, ShimCache, event logs) then create bit-by-bit disk images. - Boot from a clean USB, run a reputable recovery ISO (e.g., Kaspersky Rescue Disk, ESET SysRescue) and delete these artefacts:
-
C:\ProgramData\filegofprencrp.exe
(main dropper, static path). - Run-keys:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\FGRP = "C:\ProgramData\filegofprencrp.exe -m"
- Scheduled Task
\Microsoft\Windows\DiskFootprint\FGPRStart
.
- Remove any newly-created local users (
svcnew
,support_388945a0
, etc.). - Patch the exploited vector (e.g., reset ALL RDP passwords, patch Confluence, remove Log4j .jar).
- Re-image the box or rebuild from known-good gold-image; restore data only after confirming the infection chain is eradicated company-wide.
3. FILE DECRYPTION & RECOVERY
- Current status: No flaw publicly known; uses ChaCha20 + RSA-2048 (ciphertext from attacker-controlled server).
- Decryptor available? No free decryptor as of 2024-05.
- Options:
- Check ID-Ransomware and NoMoreRansom portals monthly—several private firms have broken “FileGo”/”GoPrencrp” campaign keys for older v1 (extension
.goprencrp
) but not yet for.filegofprencrp
v2. - If shadow copies were not wiped (
vssadmin delete shadows
is skipped on ≈30 % of runs), copy data back:
wbadmin get versions –backupTarget:\\?\Volume{…}
- Explore Windows “Previous Versions” GUI—surprisingly effective when attackers forgot to run
-forcerestart
as SYSTEM. - File-fragment carving with PhotoRec/Scalpel works for non-fragmented Office docs when shadow copies exist.
- Cloud recycle bins (OneDrive, Google Drive, Dropbox) usually keep 30 days of file history—restore from web console.
- Negotiation / paying the ransom is technically possible via TOX chat but NOT recommended (no guarantee, funds criminal actors, and may breach OFAC sanctions).
4. OTHER CRITICAL INFORMATION
-
Kill-switch check: Payload asks
http[:]//filegofprencrp[.]com/ks.php?k=
– returning “0” continues, “1” exits. Blocking that FQDN after infection stops NEW machines from encrypting but does not help already hit systems. -
Embedded but unused routine for ESXi (
vmon
), Hyper-V VHDX, and MySQL/MariaDB services (stops them gracefully prior to encryption—rare consideration among ransomware). - Network printers are spammed with ASCII art ransom note pages—wastes paper but also alerts staff quickly.
- Certain builds corrupt ChaCha20 keystream on files > 4 GB leaving them partially recoverable—check large files with a hex-editor for plaintext chunks; recovery may be worth the manual effort.
- The group peddles “monthly penetration testing” services post-breach—decline; they will re-enter later.
By understanding .filegofprencrp
’s entry paths, maintaining offline backups, and following the step-wise eradication plan above, defenders can both avoid the initial hit and rebound quickly should the encryption routine fire. Good luck, stay patched, and keep those backups immutable!