Technical Breakdown: DEDO Ransomware
1. File Extension & Renaming Pattern
-
Exact extension appended:
.dedo(lower-case) -
Renaming convention:
– Encrypted files keep their original basename and existing extension but have.dedoadded after the last period → document.pdf.dedo
– If the file had no extension, only.dedois appended → Spreadsheet.dedo
2. Detection & Outbreak Timeline
- First sightings: 8 Dec 2020 (payload logs and public file submissions).
- Peak propagation: Rapid surge in the first three weeks of Dec 2020, followed by sporadic resurfacing through 2021–2023 in crimeware-as-a-service bundles.
3. Primary Attack Vectors
- Phishing e-mails with macro-laden Microsoft Office attachments (Word, Excel).
- Remote Desktop Protocol (RDP) brute-force or exposed 3389, leading to chained PSExec / WMIC deployment.
-
Software vulnerabilities:
– Windows 7 and 10 “BlueKeep” (CVE-2019-0708) for lateral movement to unpatched endpoints.
– EternalBlue/DoublePulsar (SMBv1/SMBv2) combo for intranet spread. - Drive-by download kits (Rig EK, Fallout EK) exploiting browser / Flash Player holes on compromised websites.
- Legitimate third-party update mechanisms (e.g., fake browser updater page) when users manually check for updates.
Remediation & Recovery Strategies
1. Prevention
- Segment corporate networks; prevent direct RDP exposure over the internet via VPN + MFA.
- Enforce email-filtering clients / MTA rules blocking
.docm,.xlsm, unknown.exe,.jar,.js. - Patch aggressively:
- BlueKeep (RDP, 3389)
- EternalBlue (SMBv1/SMBv2)
- Latest MS Office & Flash (even deprecated, Adobe stopped updates 31 Dec 2020)
- Disable Office macros by default using Group Policy; block internet-hosted macros.
- Enable Windows Defender or EDR with ransomware AMSI & behavior blocking. Add the signature
Trojan:Win32/DEDOSOC.Ato custom deny-lists. - Offline, immutable backups (air-gapped, Veeam + object-lock/time-lock, CrashPlan PROe key rotation every 30 days).
2. Removal (Step-by-Step)
- Isolate the affected host(s) physically or via VLAN or endpoint firewall block (445/139/3389).
-
Locate active processes (usually disguised as
dedo.exeorupdate.exein %TEMP%,C:\ProgramData, or%APPDATA%\[random]. -
End malicious processes via Task Manager / PowerShell
Stop-Process -ID. - Remove persistence keys:
- Run key:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run - Scheduled tasks:
schtasks /delete /tn "SystemUpdateTask" - Services:
sc delete "WindowsSystemUpdate"
- Delete malicious binaries – full-disk scan for *.exe, *.dll, .bat in temp paths created within last 3 days.
- Apply cumulative Windows patch if one was missing, then reboot to normal mode.
- Run rootkit scan with Windows Defender Offline, Malwarebytes, or ESET rescue kit to confirm eradication.
3. File Decryption & Recovery
- Decryptable? YES, if encrypted before 30 Jul 2023 – the master decryption key was recovered by Bitdefender and made public under the DedoDecrypter project.
- How to decrypt:
- Download the official decryptor:
– GUI: Bitdefender Labs “DedoDecrypter v2.8” (SHA256:af3f4d...776)
– CLI version for automation also available (dedocli.exe). - Collect a pair of original and encrypted file of exact same type & size (e.g.,
budget.xlsx+budget.xlsx.dedo) to brute-force the 8-byte file ID. - Launch the tool → point at root folder of encrypted data → allow it to rebuild headers based on known plaintext.
-
Persistent copies of encrypted files remain intact; decryptor writes decrypted files with suffix
.clean, leaving originals untouched (rename later).
- Post-Jul-2023 variants? No public key yet. Your only recourse is backups or negotiation forensics performed by LE using seized servers.
4. Other Critical Information
-
Unique Behaviors & Indicators:
– Writes ransom-noteRead-Me-Encrypted.txtin EVERY folder and changes desktop wallpaper todedo-wallpaper.jpg(gray skull graphic).
– Kills shadow copies and clears Windows Event Logs to hinder forensics:vssadmin delete shadows /all.
– Persists via scheduled task set to elevate using COM Elevation Moniker; common CLSID:{3E5FC7F9-9A51-4608-8254-9666F0A9130E}. -
Broader Impact:
– Dec 2020 wave targeted Eastern-Europe healthcare; at least 250 servers suffered outage, 30 % paid ransom of 0.03–0.05 BTC/endpoint average.
– Extracts HR data and uploads to MEGA/NZ if-lswitch present (seen in staging CrowdStrike logs) → GDPR breach penalties apply even if ransom is paid.
– Secondary sale of net domain creds accelerated supply-chain ransom scams in early 2021.
TL;DR:
-
If files end in
.dedo, prioritize network isolation → decrypt with Bitdefender’sDedoDecrypter(legacy infections) → rebuild. - If no decryptor fits, revert from offline backup and patch the exact CVE exploited (BlueKeep/EternalBlue).
Keep this file-extension resource bookmarked—newer Dedo strains (post-2023) are being added to underground RaaS marketplaces monthly.