Ransomware Intelligence Report – “.darkness”
Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: The ransomware appends “.darkness” to every encrypted file. Example:
Annual_Report.xlsx → Annual_Report.xlsx.darkness - Renaming Convention:
- Original filename remains untouched (only the suffix
.darknessis added). - Files are NOT renamed into hexadecimal strings; full folder paths and names are preserved, making inventory quicker but backups critical.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First samples observed in late November 2022, with major spikes via phishing campaigns in February and August 2023. Subsequent variants appeared sporadically through Q2-2024.
3. Primary Attack Vectors
- Propagation Mechanisms:
-
Phishing e-mails – Book-keeping, invoice, or tax-themed Office macros (
.docm,.xlsm). Macros download a signed PowerShell loader that fetches the.darknesspayload. - RDP & SMB brute-force – Scans TCP/445, 3389 for weak credentials or prior compromise. Internally it re-uses Mimikatz output to escalate.
-
Vulnerability Exploits – Known to exploit:
- Log4Shell CVE-2021-44228
- ProxyLogon CVE-2021-26855/26857
- Confluence OGNL CVE-2022-26134
- (Older misconfig) SMBv1 EternalBlue (MS17-010) only in pre-Jan-2023 samples.
- Malicious ads / cracked software – Fake game hacks and Adobe cracks on Discord & Telegram channels.
- Supply-chain side-loading – A few campaigns leveraged legitimate updaters dropping a rogue DLL that launches the payload.
Remediation & Recovery Strategies:
1. Prevention
- Proactive Measures:
- Patch all public-facing software (Exchange, Confluence, VPN appliances, Log4j2, Windows).
- Disable or restrict RDP; use RDP Gateway + MFA, enforce NLA & IP allow-lists.
- Harden SMB: remove SMBv1, enable SMB signing, and block port 445 egress.
- Disable Office macros from the internet (Group Policy, or switch to “Block macros from running in Office files from the Internet”).
- E-mail filtering: quarantine attachments containing macro-enabled files or base-64-encoded scripts.
- Application allow-listing (Windows Defender ASR rules / WDAC / AppLocker).
- Offline, immutable, daily backups (WORM, tape, or cloud + MFA + versioning).
- Deploy endpoint detection & response (EDR) with behavioral rules that trigger on:
- Large-scale file renaming with
.darknessextension. - VSSAdmin shadow-copy deletion.
- Execution of
darkness.exesigned with stolen certs (SHA256: 0a9d4…).
- Large-scale file renaming with
2. Removal
- Infection Cleanup (Kill-chain reversal):
- Isolate the host at the network level (VLAN quarantine or physical cable).
- Boot into Windows Safe Mode with Networking (or a live-rescue OS).
- Identify persistence:
- Scheduled task:
\Microsoft\Windows\UpdateOrchestrator\kernel_reminder - Registry Run keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\DarknessMain
- Scheduled task:
- Terminate any remaining
darkness.exe,lsassdump.exe, orpowerShell.exe -enc …processes. - Remove malicious files:
%AppData%\Roaming\Microsoft\Windows\darkness.exe,%Temp%\pslaunch[random].ps1. - Delete the scheduled task(s) and registry entries (backup registry first).
- Patch and reboot.
- Run a full AV/EDR scan to verify elimination.
- Investigate lateral movement (logs, RDP, SMB sessions) and reset domain passwords.
3. File Decryption & Recovery
- Recovery Feasibility:
- Official decryption has not been released (AES-256 + RSA-2048 key pairs generated per campaign).
- Free decryptor MAY arrive only if reputable security researchers seize the master keys, as happened with CONTI and Babuk (not yet for .darkness).
-
Immediate action:
- Check
id.txtorREADME.darknesson infected systems—if the ransom note explicitly mentions a ‘Negotiation Trial’: some affiliates coerce you into a “test decryption” but do NOT give real keys. - Upload unused/backup email header from the ransom page to www.nomoreransom.org or upload one encrypted & one unencrypted pair to ID-Ransomware to track any tool release.
- Check
- Essential Tools/Patches:
- Patch bundle (EternalBlue): [MS17-010 Security Update]
- Log4Shell fixes: [Apache Log4j 2.12.4 / 2.17.1]
- NoDecrypt-v1.2 checker (validates if current .darkness build uses precomputed keys).
- Offline backup restore utilities (e.g., Veeam SureBackup, Microsoft Azure Immutable Blob Storage).
4. Other Critical Information
- Additional Precautions:
-
.darknesskills shadow copies (vssadmin delete shadows /all /quiet) and removes free-space snapshots (cipher /w:c:). - Known to exfiltrate credential stores (
ntds.dit, SAM, Browser DB) viaPowerShell-Invoke-WebRequestto attacker C2 (AWS S3 or Alibaba OSS). - The malware self-propagates via PsExec & WMIC to remote machines provided domain credentials are harvested.
- Embedded anti-forensics: Clears Windows event logs IDs 4624 (logon), 4688 (process start) and replaces crash-dumps with junk data.
- Broader Impact:
- Manufacturing & logistics SMEs hardest hit – reported average downtime of 7–10 days when backups were absent.
- Dual extortion variant posts victim data on a Tor leak site “publeaks[.]fail” after a 72-hour countdown.
- Notable uptake by a mid-tier affiliate known as “BloodyTuesday,” who publishes spreadsheets of leaked data for competitive bidding.
Summary Checklist
| Action | Deadline | Owner |
|——————————-|———–|————|
| Validate backups offline | Today | CTO/SOC |
| Deploy MS January 2023 patch | 24 h | Patch mgmt |
| Force Office macro blocklist | 2 days | GPO team |
| Enable EDR rules “.darkness” | Now | SOC |
| Review RDP & VPN logs | 1 week | IR team |
Share this intel with peer networks. If a free decryptor becomes available, Nomoreransom.org will be the first to host it. Until then—patch aggressively and back up immutably.