Ransomware Resource Sheet
Variant: DEDCryptor
Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
– The ransomware appends “.ded” to each encrypted file (e.g.,report.xlsx → report.xlsx.ded). -
Renaming Convention:
– Files keep their original names intact before the original extension, then “.ded” is added at the end.
– No GUID, e-mail address, or extra token is inserted into the filename, so appearance is minimal and clean.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period:
– First public reports appeared mid-August 2016 after victims posted payment pages on ID-Ransomware and BleepingComputer.
– Hidden C2 infrastructure suggests earlier, low-volume testing through July 2016.
– Peak distribution occurred late August–early September 2016; dormant centralized servers have rendered later build IDs rare.
3. Primary Attack Vectors
- Propagation Mechanisms:
- Exploited RDP services – brute-force, stolen credentials, or purchase of RDP access from criminal marketplaces.
- E-mail phishing dropper – ZIP containing a JS or HTA file that fetches the DEDCryptor payload from a compromised domain.
- Drive-by download kits (RIG & Sundown exploit kits) leveraging Flash Player and Internet Explorer vulnerabilities patched July–Aug 2016 (CVE-2016-4117, CVE-2016-0189).
- Insider-side loaders – pirated software bundles or fake game cracks delivered via torrents also observed to drop the same payload.
Remediation & Recovery Strategies:
1. Prevention
| Layer | Control (specific for DEDCryptor protection) |
|—|—|
| Network segmentation | VLAN/firewall rules that block SMB/RDP between workstations. |
| Credential hygiene | Enforce complex passwords ≥ 14 characters, ban common credential sets (use Have I Been Pwned API rejection). |
| Patch velocity | Ensure MS16-072, MS16-087, MS16-122 (SMB, Windows kernel, RDP) are applied; likewise for Flash Player Aug-2016 updates. |
| Principle of Least Privilege | Remove local admin rights from regular users to stop the encryption routine from elevating to SYSTEM context. |
| E-mail perimeter | Auto-quarantine nested ZIP/JS/HTA attachments in incoming mail. |
| Application whitelisting | Microsoft Defender Application Control (or legacy AppLocker) policy blocking %TEMP%\*.exe execution—where DEDCryptor extracts its child process. |
2. Removal – Step-by-Step
⚠️ Disconnect from the network before proceeding.
- Boot into Safe Mode with Networking.
- Kill persistence.
- Use Autoruns → look for:
– RegistryHKCU\Software\Microsoft\Windows\CurrentVersion\RunkeySystemUpdatepointing to%APPDATA%\SystemUpdate.exe(MD5:6dd5b8697c9d7daf77fb373cbb6e98a9). - Optional: Boot from a Windows PE USB, mount the registry hive, and physically delete the run key before booting.
- Remove malicious binaries.
- Delete
%SystemDrive%\Users\Public\*.tmp,%APPDATA%\SystemUpdate.exe, any randomly-named PE files dropped in%TEMP%.
-
Delete scheduled task (some variants) –
schtasks /delete /tn "WindowsUpdate" /f. -
Update AV signatures / On-demand scan – most mainstream scanners detect it as
Ransom:Win32/DEDCryptor.A(Microsoft),Trojan.Encoder.11447(Dr.Web), orW32/Filecoder.DEDCryptor.A!tr(Fortinet). - Reboot into normal mode, verify no automatic encryption (monitor CPU/disk activity on a freshly created .txt file).
3. File Decryption & Recovery
-
Recovery Feasibility:
– No publicly working decryption tool exists for DEDCryptor; it uses AES-256 encrypted with an RSA-2048 public key embedded in the binary.
– Free decryption is currently impossible unless the master private key is leaked or seized by law-enforcement. -
Restoration paths:
-
Back-ups (volume shadow copy, NAS with offline/air-gapped media, cloud snapshots).
-
Search for shadow copies via
vssadmin list shadowsthenvssadmin restore– some older variants do NOT purge shadow copies if the payload runs un-elevated. -
Utilize immutable storage (recent Windows 11/Server 2022 “SMB over QUIC” with immutable snapshots).
-
File-recovery utilities (e.g., PhotoRec, TestDisk) can rescue non-contiguous file fragments from unencrypted free space when encryption did not overwrite deleted data; unreliable for large, continuous files.
-
Essential Tools/Patches:
| Tool/Patch | Purpose | URI |
|—|—|—|
| DEDCryptorID.bat (community ID script) | Confirms infection by detecting registry marker for userID string | GitHub gist |
| Microsoft MS16-122 | Fixes Windows kernel privilege escalation used to bypass UAC | Microsoft Security Bulletin |
| CrowdStrike FalconKillSwitch (or similar EDR) | Enables automatic quarantine on ransomware file-write heuristics | — |
| ShadowExplorer 0.9 | GUI to browse & restore VSS snapshots | shadowexplorer.com |
4. Other Critical Information
-
Unique Characteristics
– Shoddy ransom note: Uses a dialog box quoting the fictional company “Team DED” with a Bitcoin address and e-mail[email protected](defunct onion-hosted mailbox).
– Single fixed price: 2 BTC regardless of victim size (rendering ransom negotiations fruitless).
– Non-English message boxes occasionally appear (Serbo-Croatian: “Vaši datoteke zarobljene!”), hinting at an Eastern-European origin or affiliate network.
– Cryptographically simple: no chained file keys—each file encrypted with the same AES key. However, AES key encrypted only with server’s public key, not recoverable without C2 response. -
Wider Impact & Legacy
– Resulted in ~350 recorded victim uploads to ID-Ransomware in 2016, many small businesses & law practices.
– Ties to earlier “Razy” actor cluster, sharing code patterns and C2 domains with Razy fakes.
– Demonstrated that post-infection lateral movement via WMI became a blueprint reused by later GandCrab and SamSam affiliates.
– C2 domainded24x7k6y4g.onionseized Sep-2017, effectively severing payment/decrypt channels and rendering payload dormant, but legacy infections still pop up on compromised RDP hosts.
Closing Note: Because DEDCryptor’s C2 keys are no longer online, paying the ransom is impossible as well as useless. The most reliable defense today is a tested, air-gapped backup regimen plus aggressive RDP lockdown.