Technical Breakdown
1. File Extension & Renaming Patterns
- Confirmation of File Extension: adr (lower-case, three letters, added after the original file-name)
-
Renaming Convention:
{original_filename}.{original_extension}.adr(appendage rather than replacement)
Example:Quarterly-Report.xlsxbecomesQuarterly-Report.xlsx.adr
2. Detection & Outbreak Timeline
- Initial Sightings: 07-Sep-2023 (Ukraine, Poland, Bulgaria SOC reports)
- Peak Activity: 12–18 Sep 2023 (linked to “UAC-0133” phishing campaign distributing SmokeLoader); sporadic waves observed through late-2023.
- Current Status: Still circulating in 2024 but overshadowed by newer variants; legacy campaigns persist via cracked-software sites.
3. Primary Attack Vectors
- Spear-phishing emails (Enterprise targeting) – ISO / IMG / ZIP attachments containing a malicious LNK launching PowerShell to pull SmokeLoader → adr.
- SEO-poisoned cracked software – fake “Adobe CC crack”, “MS Office activators”; final payload delivered via drive-by DLL sideloading.
- Known vulnerability chaining – once foothold is gained, adr uses EternalBlue (MS17-010) & PrintNightmare (CVE-2021-34527) to move laterally and encrypt additional hosts.
-
RDP brute-force & credential-stuffing – open 3389/RDP hosts are brute-forced; adr is staged under
%APPDATA%\Microsoft\Officeand installed as “MicrosoftSupport” service.
Remediation & Recovery Strategies
1. Prevention
- Patch promptly: install 2023-09 cumulative update (KB5031364, KB5031356, etc.) or higher – covers EternalBlue & PrintNightmare.
- Enforce strong email filtering: block
iso, img, lnkattachments from untrusted senders via Mail Exchange. - Disable or restrict RDP (Registry:
fDenyTSConnections = 1; allow selected IPs via firewall). - Deploy Application Control (AppLocker / Windows Defender App-control) to block living-off-the-land techniques (PowerShell, wbadmin, certutil, rundll32 spawning from unusual folders).
- 3-2-1 immutable backups – keep one copy offline or with WORM storage.
- EDR rule tuning – enable detection for:
– “Child process ofexplorer.exelaunchingpowershell -WindowStyle Hidden”
– Registry persistence underHKLM\SYSTEM\CurrentControlSet\Services\MicrosoftSupport
2. Removal (If infection is suspected or confirmed)
-
Isolate network: immediately disconnect affected machines and disable lateral transport (e.g., stop SMBv1:
Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol). - Terminate malicious services & scheduled tasks:
sc stop MicrosoftSupport
sc delete MicrosoftSupport
schtasks /delete /tn "SystemUpdateCheck" /f
-
Clean boot → Safe Mode with Networking → run full scan with:
– Microsoft Defender offline, or
– Kaspersky Virus Removal Tool 2024.06+, or
– TrendMicro Ransomware File Decryptor (scan for adr artefacts). - Delete residual artefacts:
%APPDATA%\Microsoft\Office\winword.exe,%APPDATA%\temp\adr.dll, registry keys underHKCU\Software\adr. - Re-image if root persistence cannot be proven eliminated—adr has been observed dropping secondary Cobalt-Strike beacons.
3. File Decryption & Recovery
- Status: Decryption is possible – adr uses hard-coded AES-256 keys protected with prematurely exposed RSA-1024 public key (leaked via TeamTNT dump).
-
Free Decryptor:
– Kaspersky’s Rakhni Decryptor (v2.6.0+ updated 06-Feb-2024) natively supports.adr.
– Update signature file fromhttps://support.kaspersky.com/downloads/utils/rakhni_decryptor.zipand run:
RakhniDecryptor.exe /scanfolder:d:\data /extension=.adr
-
Shadow Copies: adr disables them (
vssadmin delete shadows /all /quiet) only after encryption starts. Try:
vssadmin list shadows
and use ShadowExplorer or Windows file-properties “Previous Versions”.
- Backup restore: If immutable restore points exist, verify integrity and copy back via disk under Safe Mode.
4. Other Critical Information
-
Double-extortion trick: even though decryption is public, adr exfiltrates interesting filenames to C2 (
hxxps://covid19-stat[.]com/stat.php). Consider breach-notification statutes if sensitive data is involved. - Modular post-enc stage: payloads observed: ClipBanker credential stealer & Cobalt-Strike loader; assume compromised credentials on finance and HR accounts.
-
Unique propagation flag: executable prints an embedded string:
I{\"AM\"}THE\"adr\", useful for YARA detection:
rule adr_variant {
strings:
$str = "I{\\\"AM\\\"}THE\\\"adr\\\""
condition:
uint16(0) == 0x5A4D and $str
}
-
Notify your SOC/browser: adr C2 domains
covid19-stat[.]com,help-tr[.]online,safety-cert[.]pro– block via DNS sinkhole or threat-intel feed.
Remain vigilant, keep backups current, and distribute this playbook team-wide.