Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
dodov2appends the extension.dodov2to every encrypted file. -
Renaming Convention: Original file names remain intact; only the final extension is appended.
Example:Q1-Budget.xlsx→Q1-Budget.xlsx.dodov2.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First specimens surfaced in underground forums on 23-March-2024; the active public outbreak was observed in the wild around 15-April-2024 during the “Spring-Wave” campaign.
3. Primary Attack Vectors
- Propagation Mechanisms:
-
Phishing via ZIP-JS bundles: E-mails contain password-protected ZIP archives (
“Purchase_Order.zip”) that host heavily obfuscated JavaScript droppers. - Public-facing web applications: Exploits Telerik UI for ASP.NET AJAX CVE-2019-18935 and CVE-2020-28188 for initial foothold.
- Ransomware-as-a-Service (RaaS): Affiliates are provided the dodov2 builder and allocated Tor payment gateways; payloads share 80 % code overlap across variants.
-
USB & Network share enumeration: Uses built-in Mimikatz fork (
mimidodo.dll) to harvest credentials and pivot via SMBv2 (not EternalBlue) to propagate laterally. - Chained vulnerability after Exploit Kit load: Multiple affiliates combine ProxyLogon/ProxyShell chains to drop the dodov2 payload once shell-code staging is complete.
Remediation & Recovery Strategies:
1. Prevention
| Control | Action Steps |
|———|————–|
| Email filtering | Block “*.zip compressed *.js” attachments, quarantine or strip password-protected archives, add “dodov2” & “dodo” keyword rules to mail-flow policies. |
| Patch cadence | Priority patches: ASP.NET Telerik UI (CVE-2019-18935, CVE-2020-28188), Exchange ProxyLogon/ProxyShell, Windows SMBv1-v3 configurations. |
| RDP lockdown | Restrict external 3389, enforce NLA + MFA, deny asset-based location policies where applicable. |
| Application allow-listing | Applocker / WDAC to forbid unsigned JavaScript (*.js launch by wscript / cscript) in user space. |
| E-mail isolation | Enable “Safe Links” + “Safe Attachment” sandboxing if using Microsoft 365 security stack. |
| Back-up strategy | 3-2-1 offline/immutable backups, periodic restores, plus quarterly recovery-drill documentation (as dodov2 actively deletes Volume Shadow Copies). |
2. Removal
- Isolate: Disconnect affected host(s) from the network (LAN/Wi-Fi) and disable any mapped cloud drives.
-
Assess process tree: Open Task Manager → sort “Command line.” Kill
dodov2.exe,mimidodo.dll(if memory-injected), andbackground32.exe(C2 beacon). - Boot-to-WinPE or Safe-Mode: Safe-Mode- Networking is NOT advised (DLL hooks remain). Use Windows Defender Offline, Bitdefender Rescue CD, or Kaspersky Rescue Disk.
-
Scan + clean: Run updated signatures (2024-06 definition roll-up): detections
Trojan:Win32/Dodov2.A!cert,Ransom:Win32/Dodov2.B,Ransom:Win32/DodoRaaS.C. - Persistence review:
- Registry: HKCU\Software\Microsoft\Windows\CurrentVersion\Run → remove
\AppData\Roaming\dodov2\dodolauncher.exe. - Scheduled tasks:
/run "TaskServiceUpdater"created under SYSTEM or local user context. - WMI listing:
Get-WmiObject __EventFilter -Namespace root\subscriptionunder “DodoUpdater.”
- Credential reset: All local passwords and Azure / on-prem AD users (imports Mimikatz memory dump to exfiltrate NTLM, Kerberos tickets via Tor).
3. File Decryption & Recovery
| Status | Explanation |
|——–|————-|
| Decryption Feasibility: | No public decryptor as of June-2024. Payload uses ChaCha20-Poly1305 for per-file keys, RSA-4096 master (offline key for each campaign). Researchers are determining if reused weak RNG seeds leaked in earlier builds (v1 and v1.1) could move to free decryptor. |
| Emergency Recovery: | Leverage immutable backup, cloud point-in-time (Wasabi, Azure Blob versioning), and re-enable shadow-copy where possible (check vssadmin list shadows). |
| Volatility in Works: | Monitoring NoMoreRansom.org and Bitdefender BitCracker repo; any release of private-key (via law-enforcement seizure) will be echoed on social channels. |
| Manual fallback: | For small work-sets (≤2 GiB) you can attempt file-carving (PhotoRec/TestDisk) from HDD image, but this yields uncorrelated remnants. |
Essential Tools/Patches (direct links):
- Microsoft Defender Offline Updates (June-2024 AM-SIG): https://www.microsoft.com/security/defender/offline
- Latest Telerik UI Patch (Hotfix 3 – v2024.3.1004): https://www.telerik.com/aspnet-ajax/controls/ajax/release-history/ui-for-asp-net-ajax-r3-2024
- Exchange ProxyLogon/ProxyShell cumulative update (KB5027223): https://learn.microsoft.com/exchange/security/proxylogon
4. Other Critical Information
- Unique Characteristics:
-
Name-pipe mutex (“\.\pipe\DodoUpdatePipe”) used for single-instance locking; shared memory region (
DodoV2Shared) used by lateral-movement threads. -
Mini-webserver (“dodoctrl-48080”) listens locally on 48080/tcp in order to expose REST endpoints (
/encrypt,/decrypt,/c2) for affiliate consoles. - Dropped extortion note “ReadMeRestoreInstructions.txt” placed on Recycle Bin desktop, contains unique Tor3 onion (762-char). Sites enforce cat-and-mouse game with Cloudflare MITMs.
- Broader Impact/Societal Notes:
- The dodov2 RaaS platform supports “subscription tiers,” allowing low-skilled affiliates to launch nation-less low-cost campaigns – leading to a 60 % surge in .gov and municipal reports in April 2024.
- US AsylumDocumenting NGO and one logistics provider had printed-format shipment records ransomed, proving the attackers’ attempt to extort physical supply chains beyond cyberspace.
Actionable Call-Out: If your environment contains legacy ASP.NET instances or Exchange servers not yet patched for ProxyLogon/SkeletonKey, assume dodov2 reconnaissance and begin segmentation/fail-over plans NOW.
Stay vigilant, patch aggressively, and keep immutable backups cold.