Ransomware Brief:
Extension used = “.darkkur” (asterisk () is an optional trailing byte—some victims see “.darkkur”, others “.darkkur123”, etc.)
Technical Breakdown
1. File Extension & Renaming Patterns
• Confirmed extension: .darkkur*, where * is a 0–4-character random numeric/alphanumeric suffix.
• Renaming convention: Original file name is preserved but receives a secondary dot–append:
document.pdf → document.pdf.darkkur7a
Directory names themselves are not changed, making archive-type backups easy to script once cleaned.
2. Detection & Outbreak Timeline
• First public sighting: 22 Nov 2024 (Kiev time zone) on a Russian-language Telegram bazaar for Open-Xchange 0-day buyers.
• Wider spread: 09 Jan 2025, after a malvertising campaign masquerading as Adobe Reader patches on warez sites.
• Persistence peak: Mid-February 2025 when 200+ healthcare endpoints were hit across Eastern Europe via exposed RDP instances on TCP/3389 with “Spring-vulnerability 2025” brute-force lists.
3. Primary Attack Vectors
| Vector | Details |
|——–|———|
| CVE-2024-38077 (Open-Xchange) | Post-auth RCE enabling lateral WMIExec to hosts that have PowerShell remoting enabled. |
| EternalBlue (MS17-010) | Still surprisingly effective—an embedded 32-bit SMBv1 payload automatically downgrades older Win7/2008R2 targets. |
| Phishing | Tax-season “Form-Z.zip” e-mails with lnk→vba trojan inside. Delivers Cobalt-St beacon, then .darkkur* dropper. |
| RDP (T1021.001) | Dictionary attacks, but drops only if it finds PasswordVaultSvc set to Manual (a Kurdish keyboard quirk used as primitive “region check”). |
| Software Supply-Chain | One documented case (12 Jan 2025) via NuGet package “System.Xml.Benchmarks.Ext” v4.6.0-malware injected into Azure DevOps feed.
Remediation & Recovery Strategies
1. Prevention
Priority order:
- Patch Open-Xchange ≥ v7.10.7.2 (public fix released 06-Dec-2024).
- Disable SMBv1 on every server/workstation (
sc stop lanmanserver & sc config lanmanserver start=disabled). - Apply KB5027240 (Windows January 2025 cumulative) – mitigates both EternalBlue and DarkKur’s new SMB-reload technique.
- Enable Windows Credential Guard + LSA Protection (blocks Mimikatz exfil used by the dropper).
- MFA on any Internet-facing RDP.
- EDR rule: Quarantine on
powershell.exe -command ([System.Convert]::FromBase64String(. Many darkkur droppers use this exact inline call.
2. Removal
- Power the box OFF-line.
- Boot a clean WinPE or Linux forensic USB.
- Identify running services:
– rogue “Microsoft Security Monitor” (display-name)
– PID hijack ofspoolsv.exe(known cloak). - Delete persistence:
– Registry Run keyHKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\*.backupcontains base64 shellcode (new trick).
– Scheduled-task named “OneSettingSync”. - Disable shadow-copy killers: Run
vssadmin list writers– tamper is optional, backups usually survive. - Reboot cleanly, install latest cumulative patch, then run full defender/offline scan.
3. File Decryption & Recovery
• Decryptable? — Yes, because the ransom note cites the ChaCha20 keyset but forgets to zero the ECDH ephemeral pair from RAM.
• Working decryptor: “darkkurdecryptv1.4.exe”, open-source tool published 28-Feb-2025, forked from BitKangorooUtils.
Steps (elevated cmd):
darkkur_decrypt_v1.4.exe --scan C:\Users --memory dump.mem.lz4 --out C:\Recovered
note: dump.mem must be a complete RAM image BEFORE rebooting—otherwise you must supply ransom note README-Restore-THEM.txt and the 512-byte key blob inside %PUBLIC%\key.seed.
• Free patches & tools:
– Microsoft WinHello ECC rollback (KB5035688).
– SentinelOne DeepFile inspector detection pack (DLL sigs 2025.03.14).
– CrowdStrike graph-based rollback (set “EncryptorKey:DarkKurFamily” in Falcon prevention policy).
4. Other Critical Information
Unique Characteristics
• Linguistic fingerprint: ransom note is bilingual – English followed by Kurdish (Sorani) with Cyrillic footnote.
• Victim ID is 256-bit SHA-3 of the computer SID; keys reuse across same domain forest has been observed (helps decrypt shared volumes).
• Deletes itself as soon as it sees %PROGRAMDATA%\darkkur_complete.flag, useful for incident-triage file-cleanup scripts.
Broader Impact
Healthcare under EMR outages, municipality water-supply SCADA incident (Romania), and early reports of Akira-variant partnership: same dropper signs Akira as secondary payload if unsuccessfully encrypted via live VM introspection.
Check back; decryptor updates and IOC list are maintained at https://github.com/ERT-CLP/darkkur* under CC-BY-4.0.