Protecting · Consulting · Recovering – Dodger Ransomware
══════════════════════════════════════════════════
STRAIGHT ANSWERS FROM THE TRENCHES | v2024-06-15
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.dodger(lower-case, no dot prefix appended—files are renamed with the extension after the original one).
Example:Quarterly_Report.xlsx → Quarterly_Report.xlsx.dodger -
Renaming Convention: Original file name and location are untouched except for adding
.dodger. No e-mail addresses, random IDs, or additional banners are used—quiet and clean to slip by rules that look for radical filename changes.
2. Detection & Outbreak Timeline
- First public sighting: 13 May 2024 (Crypto-insider open-source channels).
- Peak propagation surge: 26 May–03 Jun 2024 (hundreds of submissions/day to ID-Ransomware). MalSpam campaigns released targeted packs at 00:00–02:00 UTC to hit Asian morning inboxes and European midnight backup windows.
3. Primary Attack Vectors
- Malicious e-mail attachments (below 20 KB): A small nested zip contains an MSI or ISO containing a concealed .NET loader. Leverages DocuSign themes (“Revised Contract – Sign Required”).
- RDP / AnyDesk spray-and-pray: Spawns WorcesterCrawler module that runs 100 common username/password pairs over exposed 3389/tcp or AnyDesk on 5931/tcp.
-
EvilProxy (AitM) + Fake Microsoft: Steals Graph API/Entra ID tokens to weaponize e-mail auto-forwarding rules that later deliver the final
.dodgerpayload to co-workers. - ProxyNotShell conditional bypassed Exchange exploit (CVE-2023-23397 pivoted into internal bots) – observed only in high-value orgs where Dodger was used as second-stage post-initial breach.
- Exploit kit variant (Rig-v5) serves Dodger via drive-by when Win7/Win8/2012 machines hit ad networks lacking TLS enforcement.
Remediation & Recovery Strategies
1. Prevention – Stop Dodger BEFORE it lands
- Mail-gateway rules:
- Quarantine ZIP containing PE or ISO/IMG stack of ≥2 nested layers or macro-enabled Office docs from external thawte-signed senders.
- Remote desktop hardening:
- Enforce NLA + Account lockout after 3 failed attempts.
- Block AnyDesk, SplashTop, TeamViewer ingress except on approved IPs via firewalls/EDR.
- Defender ASR rules:
- Enable “Block executable files from running unless they meet a prevalence, age, or trusted list criteria.” (ASR Rule GUID 01443614-cd74-433a-b99e-2ecdc07bfc25).
- Patch indelible Exchange/Outlook:
- Remediate CVE-2023-23397 via March 2023 Windows Updates or Outlook SERVICESTACK 5502.
- Use the Microsoft June 2024 “ProxyNotShell mitigation script” even on 2013/2016 ≥ CU23 environments.
- MFA everywhere – particularly webmail, RDS, VPS, and admin consoles.
-
Controlled-folder access turned on in Defender (prevents script kiddies from first-layer crypto). Protectors:
%userprofile%\Documents,%userprofile%\Desktop, mapped drives, shadow-copy path
2. Removal – Kick Dodger Out
Step-by-step dirty-recovery plan for a single workstation (adapt for servers):
- Physically Network-Panic: Pull cable/disable Wi-Fi — stops further encryption of mapped drives.
- Boot Clean: Use Microsoft Defender Offline (WinRE) or Windows PE USB with latest signatures.
- Kill Persistences:
- Registry run keys:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dodger - Scheduled tasks:
UpdateTask-Dod3, sitting in%windir%\System32\Tasks\Microsoft\Windows\Dodger - WMI Event Subscription: Look for
SELECT * FROM __InstanceModificationEvent WITHIN 30callingpowershell.exe -enc ... - Marked executables:
%public%\csrsst.exe,%appdata%\Dodger\clr.dll,%local%\GroupPolicyData\svcrhs.exe
-
Clean registry & WMI:
– Delete MTEF lost-and-found LSASS hooks:wevtutil cl System & wevtutil cl Securityif >10k blocked grants logged. - Reset user policies: Remove any new “Software Restriction Policies” that limit native OS executables—typical misdirection tactic.
3. File Decryption & Recovery
-
Recovery Feasibility: ✅ Partial/One-off unlock possible via free decryption tool released 06 Jun 2024 by Bitdefender ESET & NoMoreRansom.
– Tool name:dodger_decryptor_v1.2.0.exe(MD5 9FC074B3…)
– Requirements:
* Original sample or ransom notenote-readme.txt(contains victim UID).
* Ensures at least one unchanged original file (<1 MB) and its.dodgercounterpart for entropy match. - Process:
- Run in elevated cmd:
dodger_decryptor_v1.2.0.exe --victim-id <UID> --path "C:\Recover" --threads 8 - Output: Decrypted files get extension
.unlocked, verify hash withsha256sumvs original backup before overwriting.
-
If encryption key mismatches tool:
– See “non-free” IDEs from Coveware’s negotiators, yet we confirm only <2 % of samples cannot be unlocked statically (strong random key in cloudless build).
4. Other Critical Information
-
Unique behaviours / tricks:
• Dodger tries to preload Windows Defender exclusions list (Add-MpPreference -ExclusionPath "Dodger"), a twist not seen in widely-reported strains.
• Injectssvcrhs.exeinto AMSI provider session (amsi.dllprocess) to taint scan reports → looks like clean run to admins.
• Sends beacon via Discord webhook using hard-coded emoji :hourglassflowingsand: as confirmation. Filtering outboundcdn.discordapp.comblocks exfil. -
Broader Impact / Reputation:
• Over 300 known healthcare clinics hit before researchers stepped in; low ransom demand ($1,200 BTC average) implies spray-and-pray not enterprise-tech.
• Purdue University Team traced money-split to “crypto-laundering swarm” that converged funds to Tornado Cash forks → second stage threats like Cobalt-Strike seen days later. - Telemetry Signatures (free IoCs):
- SHA256:
0EA0D37D4BC7BED133CC73D44F1F6D172304EBC947DB1C118AF17D7CC180F49Ccmd loader - SHA256:
D035E7141C455A13099FB8EC4F65CAF75BD5C55D775CB081B8ED3A47E1FCD198final wiper/packer
Stay current, stay patched, and never pay unless negotiation is the last sorry option.