“.drop” Ransomware – Community Resource Sheet
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.drop - Renaming Convention:
- Cleans original file name →
[original_name].drop - No e-mail, user-ID, or random hex string is appended – the single 4-byte extension is the only change (this helps it hide in long directory listings).
2. Detection & Outbreak Timeline
- First public appearances: mid-October 2018 (Michael Gillespie @demonslay335 and ID-Ransomware sightings).
- Second, larger wave: March-May 2019 (Germany, Brazil, U.S. accounting firms).
- Still circulating in 2024, albeit in low-volume, “shot-gun” spam waves rather than mass exploits.
3. Primary Attack Vectors
-
Phishing e-mails
– ISO, RAR, or ZIP pretending to be invoice / FedEx / “Payment advice.”
– Lures invoke Office-Macro or JS inside the archive. - Malvertising leading to Fallout / RIG exploit kit (2019 wave).
-
Brute-forced/publicly exposed RDP → manual drop of
pon.exe / svchost.exein%TEMP%. - No SMB/EternalBlue auto-spread – lateral movement relies on credential theft & PsExec once a foothold is won.
Remediation & Recovery Strategies
1. Prevention
✔ Disable Office macros enterprise-wide; block macro files from the Internet at the e-mail gateway.
✔ Filter e-mails containing ISO, IMG, RAR and “double-extension” (e.g., invoice.xls.js).
✔ Close RDP from the Internet or enforce 2FA/VPN + rate-limiting + ‘Restricted Admin’ disabled.
✔ Keep OS + browser + Office fully patched (EK waves used Flash & IE CVE-2018-8174).
✔ Application whitelisting (WDAC / AppLocker) to stop the launcher (pon.exe, winserv.exe, svchostx32.exe, hashes change weekly).
✔ Behaviour-based AV with “Ransomware Data Protection” enabled (built-in since Windows 10 1903) and honeypot canaries.
✔ Back-ups = 3-2-1 rule – at least one copy off-line/off-site with credentials separated from production domain.
2. Removal
- Physically isolate the box (pull Ethernet / disable Wi-Fi).
- Collect a memory image if you need forensic attribution.
- Power on into Safe Mode with Networking or boot a recovery USB.
- Run a reputable remediator:
- Malwarebytes 4.x → “Scan + Quarantine” (detected as Ransom.Drop, Ransom.CryMore, or Trojan.Crypto).
- ESET Online Scanner / Kaspersky Virus Removal Tool – will find the same payload.
- Inspect auto-run locations:
–HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
–HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
normal entry name:Windows_Security→%TEMP%\svchostx32.exe - Delete the dropped binaries and the scheduled task “WindowsSecurity” that re-launches the EXE every 15 min.
- Clear Volume Shadow copies only after verifying the decryptor works or you have a working backup, else leave them intact.
3. File Decryption & Recovery
-
Recovery Feasibility: Files encrypted by
.drop(CryMore/Amnesia-family) used OFFLINE static keys for the first six months of the campaign. -
Decryptor Available: YES – Emsisoft released a free decryptor (v1.0.0.4) in Dec-2018, still maintained.
– Get it here: https://www.emsisoft.com/ransomware-decryption-tools/amnesia2
– Run it on a copy of encrypted data; it needs one intact un-encrypted file >8 kB to rebuild the key. - If your infection occurred after May-2019 the gang switched to online session keys – in that case the free decryptor will NOT work; your choices are:
– Restore from back-ups;
– Look for 3rd-party decrypt negotiations services (no guarantee – assess legal/payment risk);
– Wait (never pay the full demand immediately – the e-mail address in the ransom note ([email protected]) is usually deactivated within weeks).
4. Other Critical Information
- Ransom note filename:
HOW_TO_RECOVER_ENCRYPTED_FILES.txt(also dropped to every folder). - BTC wallet and price are hard-coded (usually 0.12–0.18 BTC) – no user-ID, so they rely on you mailing them the timestamp of payment.
- Uses AES-256 in CBC mode with a random 256-bit key per file; that key is RSA-2048-encrypted with the attacker’s public key; hence off-line brute-forcing is impossible once online keys are used.
-
Distinctive trait: Does NOT change desktop wallpaper; only the ubiquitous
*.txtnote. Many admins miss the first infections because no obvious cosmetic change occurs. - Because the malware preserves but renames original data, forensic carving tools (PhotoRec, Scalpel) rarely help – the clusters are already overwritten by encrypted content.
- Segment-of-one impact: primarily small accounting/fitness/medical offices (<50 seats). No observed data leak site – no evidence of exfiltration before encryption, so breach-disclosure laws may not apply, but assume the worst until proven otherwise.
TL;DR Cheat-Sheet
- Isolate – run Malwarebytes / ESET – kill the
Runkey. - Try the Emsisoft Amnesia2 decryptor immediately (works for pre-May-2019 variants).
- No decryptor? Restore from off-line back-ups or risk-free 3-2-1 copies.
- Harden: block macros, spam filters for ISO/RAR, close RDP, patch Flash/IE, MFA everything, test restore nightly.
Stay safe, patch early, and keep an offline backup – the only sure antibody to .drop.