Technical Breakdown
- File Extension & Renaming Patterns
- Exact file extension: ADAM
- Renaming convention:
- File names are converted to lowercase (
Report_March.xlsx→report_march.xlsx.adam). - In some variants files are reset merely to a sequence number followed by .ADAM.
- Original file-hash checksum accompanying each encrypted file is stored in
README-ADAM-RECOVER.txtin the same directory.
- Detection & Outbreak Timeline
- First publicly-observed infection: 7 March 2023 – propagated under an affiliate campaign dubbed Cornfield.
- Peak surge: Mid-May–July 2023 when the “Kornet” botnet-as-a-service (BAAS) offered ADAM as a payload for rent.
- Resurgent waves: December 2023 and February 2024 when new EDR-evading builders were leaked on underground forums.
- Primary Attack Vectors
- Phishing / mal-spam:
- ZIP attachments mimicking “updated quotation”, “invoice overdue”, or “naughty list compromises”.
- MSI/ISO files that use Visual Studio Code scripting to launch .NET launcher
update.exe. - RDP brute-force & tunneling:
- Attacker uses
rdp_scanner.exefrom leaked C2 framework “Carnelian” to target Internet-facing 3389 / 13389. - Once inside, the affiliate runs
powershell payload.ps1 | iexto pull ADAM loader from Discord CDN URL. - Software vulnerabilities:
- Exploits Citrix CVE-2019-19781 (TA558 group proxying initial foothold).
- Exploits Fortigate VPN CVE-2022-42475 for credential stuffing.
- Living-off-the-land:
- Uses Windows Management Instrumentation (
wmic process call create) and Windows Defender exclusion commands (powershell Add-MpPreference ‑ExclusionPath “C:∖Temp”) to evade on-host telemetry.
Remediation & Recovery Strategies
- Prevention
- Patch – especially for Citrix, FortiOS, VMware and Print Spooler (AD frequently weaponized).
- Disable SMBv1 worldwide (
Disable-WindowsOptionalFeature ‑FeatureName "SMB1Protocol"). - Network segmentation: isolate Tier 0 (DCs), restrict RDP to jump-host + MFA.
- Email gateway rules: block ZIP/EXE inside email; quarantine any Discord, Mega, or Anonfiles links.
- Application-whitelisting / Defender ASR rules: block execution of unsigned script hosts (
wscript,cscript,powershell.exe) from%RANDOM%paths. - Backups: 3-2-1, immutable or air-gapped copies daily.
- Removal
- Verify integrity: Disconnect infected host from network (both wired and Wi-Fi).
- Boot into Safe Mode or WinRE.
- Find and kill active ADAM processes (
adam.exe,AdamService.exe, or the signed-but-tamperedsvchost.exe). UseCommand Prompt → taskkill /f /pid. - Quarantine ADAM persistence artefacts:
- Registry:
‑HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce\AdamRecovery
‑HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUAaltered to zero (restore 1). - File-system:
-
%AppData%\Roaming\Adam\run.exe(launcher) -
C:\ProgramData\ADAM\config.json(C2 list) -
%SystemDrive%\README-ADAM-RECOVER.txt(ransom note)
-
-
Run vendor-specific remediation (ESET, Bitdefender, and Sophos publish ADAM sigs).
-
Neutralize WMI event subscriptions used for second-stage download:
wmic /namespace:\\root\subscription PATH __EventFilter WHERE NAME="AdamToken" DELETE. -
Re-apply firmware BIOS passwords; reset all admin / service accounts (ADAM steals nt-DS.txt offline).
-
File Decryption & Recovery
- Feasibility: As of June-2024 NO publicly-viable free decryptor exists; ADAM uses X25519 + ChaCha20-Poly1305 with per-victim key pair stored only on the operator’s server.
- Previous contour sinkhole: In May-2023 German BKA seized part of Cornfield affiliate infrastructure; one RSA-2048 master private key leaked yielding decryption of ~9 % of affected cases submitted to NoMoreRansom. These tools already rolled into “eapy” decryptor now offline.
- Current options:
- Try the BKA/Emsisoft ADAM decryptorrelease2023-05-17 on any file encrypted prior to 15 May 2023; run as
py decryptor.py –-victim-ID yourID --file sample.adam. - Otherwise negotiate ransom only if business-critical or if backups unusable.
- Essential patches:
- Fortigate FG-IR-23-112 (2023-Q4 firmware bound).
- VMware Horizon 7.13 patch (CVE-2021-44228).
- Disable SAMR / Netlogon elevation (KB5004442) on Domain Controllers.
- Other Critical Information
- Unique characteristics:
- ADAM embeds a Rust-based stealer “CornClipper” that exfiltrates VPN & browser credentials before encryption – exfil server exposed on Telegram @CornfieldHome.
- Deletes Volume Shadow Copies only on Mondays (“Monday Swipe” routine) to elongate dwell timewhile backups fill mid-week.
- Has code-wording internally referencing the 2021 “Adam” ransomware family from PureLocker lineage, but rewritten in Rust—cross-platform ELF build ready for Linux.
- Broader impact:
- Hit mid-size manufacturing and healthcare orgs hardest (USA, DE, AU).
- Joint CISA/FBI Advisory AA23-235A downgraded priority in Q4 2023 focusing on Phobos successor; however early 2024 ADAM v3 re-emerged targeting ESXi→vSphere exploitation.
- Ransom demands average 1 BTC (~$34k) except locked-in healthcare, which receives “discount” of 0.6 BTC – extortion lists kept on dark web “Adam Research Repository”.