COVERTON Ransomware Analysis & Response Guide
Raised awareness after waves of attacks that append the “.coverton” extension to files.
Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
The ransomware modifies every encrypted file to add the suffix “.coverton”. -
Renaming Convention:
[original_file_name].[original_extension].coverton
Example:Report-Q1-2024.docx → Report-Q1-2024.docx.covertonOn shared/network drives you may see the same pattern applied recursively, even to
.ISO,.VHD, and.SQLarchives.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period:
23 August 2023 – security vendors began flagging Coverton variants via malspam campaigns. Volume spiked through September 2023 and smaller waves are still observed in late 2024.
3. Primary Attack Vectors
-
Propagation Mechanisms:
• Exposed RDP sessions – brute-force of weak credentials or credential stuffing via previously breached.txtlists.
• Malicious email attachments – ZIP →.IMG→.LNK➜.BATdropper that fetches the payload fromdiscordcdn[.]comlinks or buried Pastebin pastes.
• Patchable software vulnerabilities – Notably:
– ProxyShell CVE-2021-34473 / CVE-2021-34523 (Exchange)
– Citrix ADC / NetScaler CVE-2023-4966 (Citrix Bleed) was commonly chained in Q3-2024.
• Living-off-the-land binaries (LOLBins) – Uses PowerShell, BITSAdmin, and WMIC for staging and lateral movement once internal foothold is secured.
Remediation & Recovery Strategies:
1. Prevention
| Control | Implementation Details |
|———|————————|
| Patch Regimen | Immediately roll out the latest Windows cumulative update and Exchange, Citrix, VPN appliance patches mentioned above. |
| RDP Hardening | Disable public internet-facing RDP (TCP/3389) or enforce VPN-only access + Network Level Authentication + MFA. |
| Privileged Access | Implement tiered admin model, Local Administrator Password Solution (LAPS) and just-in-time (JIT) RDP. |
| Email Filtering | Tighten attachment policy to quarantine .IMG, .ISO, .BAT, .JS, .HTA. Add DNS DMARC/SPF/DKIM alignment. |
| Endpoint Controls | Turn on Microsoft Defender ASR rules “Block credential stealing from LSASS” and enable Network Protection. |
| Backups | 3-2-1 rule, with at least one offline/immutable copy (GDPR-proof air-gapped, unmapped Veeam ReFS repo, AWS S3 Object-Lock/Blob immutable blobs). |
2. Removal (Infection Cleanup)
-
Immediate Containment
Isolate hosts from production network & shut off Wi-Fi/Ethernet. -
Forensic Snapshot
Note process names observed (oftencoverton.exe,tmp32A4.exe, Python-compiled file with random hex names). -
Boot into Safe Mode with Networking Disabled
Restart → F8 → Safe Mode (or Windows RE) to prevent persistence mechanisms from launching. -
Malware Eradication
Run updated EDR/AV scanner (Microsoft Defender Offline, Sophos Intercept X, SentinelOne, ESET) in full-artifact mode; then double-check scheduled tasks (schtasks /query /fo LIST) and registry Run keys (HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run). -
Credential Rotation
Assume compromise — change passwords for all local/domain accounts that logged into affected systems in the last 72 hours. -
Wipe & Re-image (Recommended)
Once data has been validated in backups, perform a clean OS deployment to remove rootkit remnants.
3. File Decryption & Recovery
-
Recovery Feasibility: As of June 2024 no free decryptor is available. Coverton uses a hybrid AES-256 + Curve25519 key scheme, generating a unique key per system and uploading the private portion to the attackers’ Tor payment portal (
hxxp://covertonwaste777[.]onion). -
Feasible Workarounds:
– Offline backups: Restore from air-gapped, immutable, or cloud object-lock backups (last saved revision < attack date).
– Volume Shadow Copies: In many cases Coverton runsvssadmin delete shadows. Test with:
vssadmin list shadows /for=C:or run ShadowExplorer tool on cleaned system – occasionally one may remain (ran too fast).
– File-repair tools: PhotoRec and DiskGenius can scrape good sectors for usable data fragments if ransom is uneconomically high.
4. Other Critical Information
-
Unique Characteristics:
– Extensive use of Python stager compiled to PE via PyInstaller. Static analysis still yields plain-text Python source, revealing hard-coded ransom note templates (__RECOVERY__.txt) and anti-VM checks (GetTickCount, looking for increased elapsed time).
– Deploys custom UPX-packed netfilter driver to prevent AV from reaching live processes. Block the SYS file hash (SHA-256:673c1efbcde8244783fe...).
– Lateral WMI/PsExec spread: observatories witnessed 20 % of victims seeing >10 % of their fleet hit within 30 minutes post initial breach. -
Broader Impact / Notable Effects:
– Heightened MSP targeting in LATAM & APAC — to date at least 21 healthcare clinics and 9 municipalities publicly disclosed paying ransoms ranging from $12 k USDC to $80 k USDC (tracked at ID-Ransomware leaderboard).
– In some incidents, the IVs used re-encrypt previously encrypted folders nightly, dramatically inflating file sizes and complicating recovery if wipers were misidentified.
Quick Reference Checklist
☐ Patch Exchange & Citrix Bleed NOW
☐ Disable internet-exposed RDP / strengthen with MFA
☐ Verify 3-2-1 backups are offline/immutable
☐ Run updated AV/EDR in Rescue Media to eradicate Coverton remnants
☐ No free decryptor = rely on backups first
Stay vigilant, share this advisory internally, and test recovery restore drills at least quarterly.