Below is end-to-end intelligence on the ransomware that appends “.charck” to every encrypted file.
Technical Breakdown
1. File Extension & Renaming Patterns
- Exact File Extension: .charck
-
Renaming Convention:
• EICAR test.txt → EICAR test.txt.charck
• report.xlsx → report.xlsx.charck
(No other prefixes, suffixes, or email addresses are placed in the file name—a hallmark of the Stop/Djvu family, of which Charck is a late-2019 variant.)
2. Detection & Outbreak Timeline
- First Observed: Campaigns spreading “.charck” first appeared on 8 July 2019 (Hive-IOCs submitted 09-Jul-2019 01:07 UTC). Peak activity occurred throughout July–August 2019, with continued low-volume infections into 2020 via “crack” and “keygen” bundles.
3. Primary Attack Vectors
- Propagation Mechanisms:
- Software Bundles: Masquerades as keygens/cracks for Adobe Photoshop, Ableton, Microsoft Office, and video-game mods (distributed through ad-powered blogs, torrents, Discord, and YouTube download links).
- Exploit Kit rotation: At time of release leveraged RIG EK (Flash CVE-2018-15982) for limited web-based drops.
-
Social Engineering: E-mails with ZIP attachments (
Ticket_<number>.zip → .exe) containing the Charck loader. - No worming modules—infection is always user-assisted (manual execution or script launch).
Remediation & Recovery Strategies
1. Prevention
• Block “.charck” signatures at the perimeter (Emsisoft, Bitdefender, Sophos).
• Disable macro execution AND enforce the MS Office block of “Mark of the Web” macros.
• Remove local-admin rights from daily-use accounts.
• Patch Windows Installers and script hosts—many variants originate via Windows Installer execution (msiexec /i setup.msi /q).
• Application whitelisting or Windows Defender Application Control (WDAC) stops unsigned keygens/cracks.
2. Removal
- Disconnect the machine from the network immediately.
- Power-off and boot from a trusted offline media (WinPE, ESET SysRescue, or Bitdefender Rescue CD).
- Run a full offline scan using one of the updated Stop-Djvu removers (Emsisoft Emergency Kit, Malwarebytes, or Kaspersky Rescue Tool).
- Clear persistence artefacts that commonly hide in:
•C:\Users\Public\Libraries\
• Registry Run keys (HKCU\Software\Microsoft\Windows\CurrentVersion\Run, ServiceHost keys). - Patch the entry path (remove cracks, close RDP port, enforce MFA, push out MS17-010 if older Windows).
3. File Decryption & Recovery
-
Recovery Feasibility:
• Offline IDs (when the malware failed to reach its C2 and used a fixed key): decryption IS possible with Emsisoft StopDecrypter (latest build 1.0.0.21, 2024-03-15). Paste one pair oforiginal.file + .charckand the tool finds the kept offline key.
• Online IDs (per-victim key generated via C2): decryption is not possible unless you can retrieve the private RSA key from the operator (extremely rare). -
How to tell: If
C:\SystemID\PersonalID.txtcontains an ID ending witht1, decryption is viable. Anything else (long random upper-case string) = online ID. -
Other Essential Tools/Patches:
• Emsisoft Decryptor for Stop/Djvu (free).
• VSS deletion blocker from Microsoft Sysinternals (VolumeID.exe) to prevent shadow-copy destruction next time.
• Latest Windows cumulative update (2024-05) to kill RIG EK Flash paths.
4. Other Critical Information
-
Unique Characteristics:
• Stolen-data upload: Since late 2019 revisions, some Charck dropper bundles silently exfiltrateDesktop\*,Downloads\*, and<browser profile>\Web Datato mega.nz via megatools.exe before encrypting. Assume data breach even if ransom is paid.
• Ransom Note is exactly “readme.txt” (not “HelpDecrypt”) placed in every affected folder.
• Uses pattern wallet 1), wallet 2) & Telegram ID “@datarestore77” (changed over time). -
Broader Impact / Notable Effects:
• Over 1 000 confirmed victims in Eastern Europe and Latin America within its first month (recorded by X-Force, July 2019).
• Because offline keys were dumped freely in June 2021 (South-Police seizure), 9 % of survivors managed 100 % file retrieval—still the best public note for any Djvu strain.
• Its codebase is reused in most Stop/Djvu variants (.gucci, .zobm, .peet), so hardening against .charck almost always prevents the rest.
Takeaway
If you see “.charck,” you’re dealing with Stop/Djvu 2019H2. Neutralise infection using the offline Emsisoft tool if the ID ends with t1; otherwise rely on clean backups and enforce layered controls to block future seed vectors (phishing & piracy).