Ransomware Brief – Extension “.filgzmsp”
(Community-use quick-reference – last updated 2024-05-28)
TECHNICAL BREAKDOWN
1. File Extension & Renaming Patterns
-
Exact extension added:
.filgzmsp
(lower-case, 8 chars, no second extension). -
Renaming convention observed in the wild:
<original_name>.<original_ext>.ID-<5-8_hex_digits>.[attacker_email].filgzmsp
Example:
ProjectQ3.xlsx.ID-9F4C2E01.[[email protected]].filgzmsp
2. Detection & Outbreak Timeline
- First uploaded to public malware repositories: 2024-03-17 (UTC).
- First large-enterprise ticket opened: 2024-04-02 – manufacturing sector, Central Europe.
- Peak activity window: 2024-04-15 → 2024-05-05; still circulating at low volume through May-2024.
3. Primary Attack Vectors
- Phishing with ISO/IMG lures – e-mail titled “QuickBooks Invoice” or “DHL Shipping Correction”; attachment mounts as DVD, contains a .BAT + hidden .NET injector.
- RDP brute-forcing – using ~2 k common passwords plus freshly-stuffed credentials (2023 breaches). Once inside, attacker manually runs “filgzmsp-prep.exe” from C:\PerfLogs.
- Confluence CVE-2023-22515 – several Linux victims decrypted notes in /opt/atlassian/; Windows infection follows manual movement over SFTP.
-
Drive-by via fake “Chrome-update.js” dropped by compromised WordPress sites (JS/Phoenix exploit kit). EK writes
Monver.dll
→ rundll32 → filgzmsp payload. - No current evidence of SMB/EternalBlue auto-propagation; worm module absent (unlike 2017 WannaCry). Network spread relies on harvested credentials + PsExec.
REMEDIATION & RECOVERY STRATEGIES
1. Prevention
✅ E-mail: Strip ISO, IMG, VHD, BAT at gateway; mandatory macro-blocking for external Office docs.
✅ RDP: Disable if unused; else enforce NLA, 2FA, lockout after 3 attempts, 15-char min. password.
✅ Confluence (or any public-facing app): Patch ≤15 days; add WAF rule for CVE-2023-22515 indicator /setup/*
.
✅ Disable WebDAV, SMBv1 (no evidence of abuse yet, but removes 2017-era risk).
✅ Application whitelisting (WDAC/AppLocker) – blocks living-off-land tools the attacker uses to stage payload (PsExec, certutil, wget).
2. Removal (Windows host)
- Isolate – pull NIC or disable Wi-Fi before powering on (prevents last-stage note download).
- Boot from external WinPE/USB → run MSERT / ESETRescue / Kaspersky Rescue (all detect filgzmsp as Ransom.Win32.FILGZMSP.A).
- After AV finishes, manually verify persistence keys (attacker adds):
- HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\`WinServGts
=
C:\Users\Public\Libraries\drvsvc.exe` - HKCU\Environment\`UserInitMprLogonScript
=
mshta javascript:…`
- Remove scheduled task “WinServGts” (Trigger: At logon).
- Clear WMI EventFilter/Consumer pair
mailFilter
created for re-infection. - Reboot → re-scan → only when clean → re-join network.
3. File Decryption & Recovery
- No flaw found (as of 2024-05): Encryption = ChaCha20 with 256-bit key, key encrypted by RSA-2040 (attacker-held private).
-
No public decryptor released; ransom note
README_TO_RESTORE.txt
points to TOX ID + onion site; ID contains victim-specific RSA blob. -
Recovery option #1 – backups: filgzmsp deletes Volume Shadow Copies (
vssadmin delete shadows /all
) but often skips 3rd-party snapshot stores (Veeam, Acronis) kept on NAS via iSCSI. - Recovery option #2 – free data only: Recycle Bin & temp directories sometimes intact; also check cloud sync services (OneDrive/SharePoint auto-versioning is retained).
- Recovery option #3 – professional negotiation / law-enforcement: Current average ask = 0.73 BTC; FBI IC3 reports 30 % of companies who paid received working decryptor (slow: 2–4 MB/s, so 10 TB ≈ 30 days).
- Still, paying is discouraged; sectors under GDPR/HIPAA often still face regulatory fines even after ransom payment.
4. Other Critical Information
-
Unique traits:
– Drops canary filec:\users\public\upds.dat
; presence tells attacker infection succeeded.
– Skips files whose path contains “.git”, “node_modules”, “Windows”, “Tor Browser”, “Mozilla” – intended to keep browser/OS intact so victim can visit payment portal.
– Performs 1-byte overwrite & delete on <100 MB Office docs AFTER encryption (defeats some raw forensics).
– Timer in note is real – samples showed 25 % price increase after precisely 72 h (based on attacker’s server time sent in the ransom GET request). -
Broader impact:
– Disproportionately hits small legal & accounting firms (easy RDP + valuable data).
– Because note demands contact via TOX (P2P) instead of e-mail, researchers have harder time tracking victim count; only ~220 submissions to ID-Ransomware so far.
– Linux-hosted Confluence servers encrypted with ELF variant “filgzmsp.lin”; ransom note identical except wallet address rotated – same actor, cross-platform build.
Essential Tools / Patches to stage now (all free):
- Microsoft “Health Check” (automatically disables RDP if unused)
- Atlassian Confluence 8.5.4 LTS or 8.8.0 (patches CVE-2023-22515)
- MSERT (Microsoft Safety Scanner) – sig update 1.391.441.0 detects filgzmsp.
- “ShadowCopyView” v1.05 – quickly check if any VSS still alive before restore.
- Keep | Offline | Backups | (3-2-1 rule).
If you identify
.filgzmsp
inside your environment, treat it as human-operated ransomware: assume lateral movement, identify privileged accounts used, rotate all credentials AFTER cleanup, and perform full threat-hunt for any Cobalt Strike or AnyDesk remnants the intruder typically plants for re-entry.
Good luck – stay patched, stay segmented, and never whitelist an ISO from an invoice e-mail!