Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.dataf -
Renaming Convention:
– Original files are copied and encrypted, leaving the plaintext files untouched but marked “0-byte” or renamed to.dataf(same as the extension).
– Example:
Budget2024.xlsx→Budget2024.xlsx.datafwith the original file overwritten by an encrypted blob.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First seen in the wild in early April 2024; a noticeable uptick in submissions to ID-Ransomware occurred between April 12–16 2024.
3. Primary Attack Vectors
| Vector | Technical Details |
|——–|——————–|
| Vulnerable SMB / EternalBlue (MS17-010) | Scans port 445. If open and unpatched, leverages EternalBlue to gain administrative access, then copies the Windows\Temp\rundll32.exe.dataf dropper. |
| Brute-forced or leaked Remote Desktop (RDP) credentials | Attacks target exposed 3389/443 hosts. Uses tools such as NLBrute.exe and Hrdpscan to cycle through usernames/passwords. |
| Malicious spam (malspam) | Pretend invoices (.html attachments) that redirect to js downloaders hosting dataf_loader.msi. Once double-clicked, UAC bypass via CMSTP. |
| Malvertising / Pirated software cracks | Fake “Adobe GenP”, “AutoCAD 2025 Crack”, etc., bundled with the .dataf dropper. |
Remediation & Recovery Strategies:
1. Prevention
- Patch MS17-010 and disable SMBv1 (
Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol). - Implement Restricted Admin RDP, enable Network-level Authentication (NLA), and use 15+ character passwords + MFA for every VPN or jump box.
- Network segmentation; block inbound 445/135/3389 from the internet at the perimeter.
- E-mail filter rule: strip
.js,.wsf,.vbs,.htaattachments and refuse HTML files that retrieve external content. - Keep offline (not just cloud-synced) backups weekly + immutable – e.g., Veeam “Air-Gapped” repository or immutable S3 buckets with versioning.
2. Removal
- Physical isolation: Disconnect the machine from network, Wi-Fi, and Bluetooth.
- Identify process(es):
– Parent:%WINDIR%\Dataf_update.exe– kill via taskkill (taskkill /IM dataf_update.exe /F) or Safe Mode w/ Networking. - Detect persistence:
– Registry HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run value “DatafUpdateSvc”.
– Scheduled Task “WindowsSystemHealthUpdate4231”. - Full scan using Windows Defender in offline mode or the free Malwarebytes Ransomware Removal Tool v3.x.
-
Delete residual indicators – folders:
%WINDIR%\System32\DatafSvc,%APPDATA%\Local\Temp\datafsvc.
3. File Decryption & Recovery
- As of June 2024, no working decryptor exists; the malware uses ChaCha20 + RSA-2048 pair for each victim.
- Check free resources monthly:
– Emsisoft Stop/Djvu Decryptor (unlikely; still verify).
– No More Ransom Project. - If you are on a domain controller and note partial encryption, shut it down immediately to prevent GPO modification and swiftly perform bare-metal recovery from a verified backup.
Essential Tools & Patches
| Tool/Patch | Purpose |
|————|———|
| MS-2024-04 Rollup | Patches one exploitable PE vulnerability leveraged by a PowerShell stage (CVE-2024-21412). |
| EternalBlue IPBlockList.txt (Microsoft GPO template) | Drops inbound packet to port 445 if remote IP matches known crush-rush scan ranges. |
| RansomFree by Cybereason (retired / open-source forks) | Lightweight behavior blocker that writes canary files; still effective against .dataf outliers. |
4. Other Critical Information
-
Kill-Switch domain: none found as of June 2024 – static C2 (
udp://packetsender.com:6740; DGA inactive). -
Hive-like lateral movement: once inside, it uses living-off-the-land batch (
wevtutil cl Application,vssadmin delete shadows) to erase logs and Windows Restore Points. -
Notable variant feature: drops a file named
!!!__RECOVER__YOUR__FILES__!!!.txtin every directory; early versions wrote the ransom note in fluent Spanish “¡IMPORTANTE! – TODOS SU ARCHIVO …” suggesting first campaigns targeted Latin America. - Wider Impact (logically extrapolated): average ransom demand 0.46–0.75 BTC (≈ $17,000–$28,000 USD); downtime in manufacturing and auto-part suppliers observed across Chile and Argentina throughout May 2024.
Stay vigilant, keep defenses up-to-date, and validate backups weekly—dataf remains active and unredeemable for now.