================================================================================
RANSOMWARE PROFILE – DAVDA
Community-based technical dossier & recovery playbook
Version 1.0 – 30-May-2024
Technical Breakdown
1. File Extension & Renaming Patterns
• Confirmed extension appended: “.davda” (lower-case)
• Typical renaming convention:
[original-file-name].[extension].davda – in English that means your report.xlsx is turned into report.xlsx.davda and the byte structure is overwritten from offset 0 for the first 128 KiB (which destroys the original file header completely).
2. Detection & Outbreak Timeline
• First appearance / seeding cluster: 05-Oct-2018 (early sightings on Russian bulletin boards).
• Peak propagation window: November 2018 – June 2019, largest single-purpose wave associated with massive malvertising campaigns from the RIG and GrandSoft exploit kits.
• Still circulating: Yes, but now only in re-branded “child variants” and affiliate kits forwarded by the original developers under the STOP/Djvu family umbrella.
• Identifier aliases/AV signatures: Win32/Filecoder.STOP (ESET), Trojan:Win32/StopCrypt (Defender), Ransom:Win32/StarkWare, Mal/CoNBE-A (Sophos).
3. Primary Attack Vectors
- Exploit kits
• Leverages RIG EK and GrandSoft EK dropping Vidar/Amadey loader that installs DAVDA as a final stage. - Cracked software torrents & “keygen.exe” bundles – the most productive channel (~55 % of reported infections).
- Spam/phishing e-mails (.ISO, .IMG, .PPS file attachments) that run a hidden .js or .vbs after double-click.
- RDP brute-force – used occasionally to traverse breached networks, but not the initial entry point in most cases.
- Vulnerabilities – in 2018 wave: old Oracle WebLogic (CVE-2017-10271), later in 2019 moved on to Citrix Netscaler (CVE-2019-19781).
Important 2024 note: the underlying strain stopped evolving and is morphing into STOP/Djvu derivatives carrying the same .davda but the master RSA public key inside the sample has changed from 2048- to 4096-bit – older decryptors no longer work.
Remediation & Recovery Strategies
1. Prevention
| Domain | Action items |
|—————————-|———————————————————————————————————————————————————————————|
| Software & OS | • Patch aggressively: Windows October 2018 KB4462933 and later, and any follow-up March-2024 cumulative stack.
• Disable WebDav service via registry (HKLM\SYSTEM\CurrentControlSet\Services\WebDAV) – DAVDA relies on it for drive-mapping<|reservedtoken163809|> |
| Email & Browsing | • Strip ISO, IMG, RAR, ZIP with exe/js content at the gateway.
• Block macros from executing if the file is downloaded from the internet. |
| Accounts & Perimeters | • Enforce 14-16-char passwords & 2FA on RDP and externally-exposed services.
• Segment networks – file-shares significantly reduce blast radius. |
| Backups | • 3-2-1 rule with immutable off-site/cloud backup (write-once media or object lock). Make daily automated snapshot and monthly backup-campaign password protected offline. |
2. Removal / Clean-Up Playbook
- Disconnect – cut power to Wi-Fi / Ethernet immediately to stop file encryption in progress.
- Boot into Safe Mode or WinRE.
- Collect forensic image of the infected disk (optional, for later law-enforcement hand-off).
- Run reputable AV or boot-disk tools (ESET Online Scanner, Kaspersky Rescue, Windows Defender Offline). Remove signature patterns:
%Temp%\[5-random-hex]\[random].exe
%AppData%\Services\ServiceManager.exe
HKCU\Software\Classes\.davda
HKLM\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllIsMyFileType2
RunOnce key: “{random 6-chars}\{random 8-chars} = %AppData%\…\zm.exe”
-
Purge shadow-copy reset: DAVDA runs
vssadmin delete shadows /all– still checkvssadmin list shadows. - Verify persistence removal by scanning scheduled tasks (
schtasks /query) for “SystemUpdate” and similar entries — delete if found. - Reboot to normal mode.
3. File Decryption & Recovery
• Free decryptor public? Yes, for DAVDA version 1164 and older (DSCHHELMAIN key sets). STOPDecrypter (v2.1.2.0) and the Emsisoft Decryptor for STOP/Djvu can recover files only if the malware used an “offline key” (You’ll see in the ransom note these lines: Extension = davda, Id = 0237xxx ending in t1 — that’s offline).
• No – when impossible: If the system ID ends in t2 (online key), decryption is tied to the master RSA key which is server-side – no public key break available.
• Step-by-step after cleanup:
- Obtain the Emsisoft Decryptor directly from emsisoft.com (avoids copy-cat malware).
- Run it with admin rights on the clean OS, let it fetch latest offline key list (
stops.csv). - Choose the root of the encrypted drive and hit “Decrypt” – expect 2–3 GB/min speed.
• Crypto-reversal tools irrelevant here – DAVDA uses AES-256 in CBC + RSA-2048; brute-forcing is computationally unfeasible.
4. Other Critical Information
• Ransom note: “_readme.txt” with standardized template “Don’t worry, you can return all your files!”. Only the extension line changes per sub-campaign.
• Exfiltration: Pure encrypt-and-forget; no data theft in the original strain but later STOP variants may exfiltrate credentials via Vidar and AZORult.
• UAC bypass trick: DAVDA copies itself into %APPDATA%\SysWOW64\ using icacls to inherit SYSTEM rights, making AV false-positive whitelists more confusing.
• Impact snapshot: From BleepingComputer incident reports, +8 000 consumer PCs in Eastern Europe / LATAM / South-East Asia were Appendix A (Oct-2019). Corporate infections remained rare due to DAVDA’s poor lateral-movement logic.
================================================================================
Quick-Reference Check List
✓ See extension “*.davda” – isolate, run Emsisoft tool only after AV clean-up.
✓ ID ending “t2” → Restore from offline backup.