Below is the most up-to-date, community-oriented reference on the CODNAT ransomware strain (file extension .codnat
). Use it as a living document—bounce any questions or corrections back to the channel.
Technical Breakdown
1. File Extension & Renaming Patterns
- Extension added: “.codnat” (always lowercase, 6 fixed bytes appended after the final dot).
-
Full rename pattern:
[OriginalName][random-5-byte-strong-hex].codnat
Examples:
•Quarterly-Report-2024.xlsx
→Quarterly-Report-2024.xlsx.C6E3B.codnat
•Photo-001.jpg
→Photo-001.jpg.9F1A2.codnat
2. Detection & Outbreak Timeline
- First samples: Found 04 Jun 2023 in VirusTotal uploads from Eastern Europe; public campaigns detected late June–early July 2023.
- Acceleration phase: Typical peak volume hits 48–72 h after each new loader update, then slows once IOC signatures roll out.
3. Primary Attack Vectors
Primary delivery paths observed (combine at will in each wave):
| Vector | Details | Mitigation Notes |
|—|—|—|
| Phishing with ISO → LNK → Script chain | E-mail lures a fake contract/Tax Office ZIP containing an .iso mount image with hidden .lnk → .bat → PowerShell stager. | ISO blocking in 2023 Outlook update kills first stage. |
| RDP compromise from underground servers | Actors buy credentials on Genesis Market and brute remaining servers (port 3389/3390). Common “Password123!” variants. | Obfuscate RDP with tunneling and/or zero-trust network access (ZTNA). |
| EternalBlue (MS17-010) + DoublePulsar on unpatched Windows 7/Server 2008R2 — still occasionally successful on HVAC or ICS hosts. | Patch is 6+ yr old; if port 445 exposed externally, treat as high priority. | |
| Fake Windows Updates pushed through malvertising (Rotten Newspaper campaign) | Pop-ups urge “SecurityUpdate.exe” download signed with stolen expired certificate. | Chrome/Edge have built-in malvertising filters; do not allow “Search provider install” prompts. |
| Leveraging CVE-2023-34362 MOVEit SQLi (Jul 2023 rev share affiliate) to plant web shells → Cobalt Strike → CODNAT. | | Block outbound SMB on edge and hunt webshell droppings (.cmd, .aspx). |
Remediation & Recovery Strategies
1. Prevention (repeat daily until boring)
- Disable SMBv1 via GPO or
Disable-WindowsOptionalFeature -Online –FeatureName "SMB1Protocol"
(CODNAT still bundles EternalBlue). - Block macros from the Internet (
reg.exe ADD "HKCU\Software\Policies\Microsoft\Office\16.0\Word\Security\VBAWarnings" /t REG_DWORD /d 4 /f
). - For RDP: require NLA, enforce 2FA, change default port, IP whitelists, and lockout policy (3 strikes).
- Implement SRP / Applocker “allow-list” blocking
%USERPROFILE%\Downloads\*.exe
. - Backups: keep at least one offline and immutable (object-lock* or Veeam hardened repo). CODNAT actively deletes Shadow Copies (
vssadmin delete shadows /all /quiet
) only AFTER it has encrypted.
2. Removal (step-by-step)
- Isolate: Boot victim from network—disable Wi-Fi, pull cable or vNIC down in hypervisor.
- Preserve artifacts: Image or snapshot of disk (EVTX, MFT, ransomware binary in %TEMP% or AppData\Roaming).
-
Kill processes: Look for
cqjdco.exe
,rundll32.exe
child of regsvr32 launching random-name DLL, or CobaltStrikedllhost.exe
. Terminate via Defender-ASR or Taskkill. -
Delete persistence:
• Scheduled task “OneDriveServices” with commandrundll32.exe applaunch.dll,service
.
• Registry run keys (HKCU Run, HKLM Run) under random Unicode names. -
Malware scrub:
• Full offline scan: Microsoft Defender offline build 1.383.x+ (signatures updated 12 Aug 2023) removes both CODNAT and trace loaders with high MSI score.
• Optional: ESET’s Emergency Online Scanner or Kaspersky’s Rescue USB for GRUB-located TMP copies. - Patch / audit: Run Fortinet’s IOC checker that flags any remaining exploitation artifacts (.ps1 stage or lateral-movement WebDAV mappings).
3. File Decryption & Recovery
-
Free decryptor? NO at this time.
CODNAT uses Curve25519 ECDH session keys + ChaCha20 stream on a per-file basis. Keys are not escrowed locally, and no bug has been disclosed. - Limited outliers: if the victim was caught while ransomware still ran (partial encryption), static restoration (see below) may restore some Office files that it didn’t finish. This is rare—expect 1–3 % success.
- No leaks from affiliates or law-enforcement have surfaced (as of Aug 2024).
-
Static file rebuilding options
• Photorec or Recuva on the underlying drive after imaging.
• For MSSQL: MDF files overwritten in 4 KB blocks can yield tables via EaseUS SQL Recovery if >50 % original data survives; expect manual joins. - Final word: cheaper path is clean-restore from backups / cloud snapshot with epoch ≤ infection. Test the archive first—some affiliates delay infiltration for weeks.
4. Other Critical Information
- Brand / affiliation: Now mapped to MEDUSALOCKER family branch R; blocks can be identified by ChaCha OID 1.3.101.18 embedded in executable resources.
-
Unique routines:
• CODNAT checks for Russian locale (GetSystemDefaultLangID
==0x0419) and self-destructs (likely to avoid CIS justice).
• Survives sleep-mode with a watchdog scheduled task firing every 15 min (Task Scheduler trick).
• Uses valid-but-revoked Let’s Encrypt certificates to mask C2 traffic to mpsvc[.]top and nectarworks[.]io (compromised WordPress). -
Broader impact:
• Heavily targeted SOHO NAS (QNAP, Synology via CVE-2023-28854) pre-encrypt file shares, then pivots into SMB shares.
• Around 6 % of observed cases include data leak extortion (r/CODNAT posts) if ransom unpaid within 4 days: links to MEGA folders with 10-40 GB dumps.
Last Word
If you are already compromised with .codnat files, the fastest route to completeness is:
- Accept that decryption is not (yet) possible.
- Re-image, patch, change all domain credentials, rotate backup keys.
- Feed recovered artifacts (ransom note, binary, bitcoin address) to the “No More Ransom” portal daily; an eventual free tool is most likely to appear there first.