ebaka Ransomware – Community Resource Sheet
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.ebaka(lowercase) -
Renaming Convention:
– Original filename →<original_name>.<original_ext>.ebaka
– Example:Invoice_05_2024.xlsxbecomesInvoice_05_2024.xlsx.ebaka
– No e-mail or ID string is inserted, so every victim sees the identical pattern.
2. Detection & Outbreak Timeline
- First public submission: 2024-02-13 (VirusTotal)
- First large-scale forum reports: 2024-03-02 (South-Korea & U.S. MSPs)
- Peak activity window: 2024-03-05 through 2024-03-20 (still fluctuating).
3. Primary Attack Vectors
- Exploitation of vulnerable ScreenConnect servers (CVE-2024-1709 & CVE-2024-1708) – used to drop first-stage PowerShell loader.
- Phishing with OneNote or PDF attachments containing obfuscated .wsf or .js that retrieve the second-stage DLL.
- RDP brute-force / credential stuffing followed by manual deployment of ebaka.exe.
- Malvertising pushing fake “Chrome / Notepad++” updates that side-load the DLL.
- No current evidence of worm-like SMB/EternalBlue propagation – lateral movement is performed with living-off-the-land tools (WMI, PsExec, PowerShell remoting).
Remediation & Recovery Strategies
1. Prevention (short checklist)
☐ Patch ScreenConnect (or simply remove from edge if unused).
☐ Disable RDP on perimeter or enforce VPN + MFA + account lockout.
☐ Strip Microsoft OneNote “file-embedding” capability via GPO (KB5025305).
☐ Enforce Windows AMSI & Defender real-time; add ASR rule “BlockOfficeChildProcess”.
☐ Application whitelisting (WDAC/AppLocker) – block unsigned .exe/.ps1/.dll in %temp%.
☐ 3-2-1 backups (offline, immutable, tested).
☐ Deploy Canary-token files in key shares – trigger alert on mass rename.
2. Removal / Containment (step-by-step)
- Power-off network segment; collect triage image if investigation required.
- Boot a clean Windows PE / Linux live USB → copy uninfected data before cleanup.
- From Safe Mode with Networking:
a. Identify the offending process (parent ofebaka.exeis oftenpowershell.exeorcmd.exewith-enc).
b. Terminate and delete the run-key entry (HKCU\Software\Microsoft\Windows\CurrentVersion\Run– value “xbxaux”).
c. Remove the persistence DLL (C:\ProgramData\svsvc.dll).
d. Clear WMI event subscription__EventFilternamed “EvtFlteb4”. - Update & scan with fully-patched AV/EDR ( signatures >= 1.395.621.0 detect as
Ransom:Win32/Ebaka.A). - ONLY THEN reconnect to network to download OS patches & change all local/domain passwords.
3. File Decryption & Recovery
- Decryption feasibility at present: NOT possible offline – ebaka uses Curve25519 + ChaCha20-Poly1305; each victim gets a unique keypair.
- No flaw (iv reuse, s-box leakage, weak PRNG) has been found by researchers.
- No free decryptor exists as of 2024-04-12.
-
Recovery paths:
– Restore from offline/uninfected backups (check.ebakaextension is absent).
– Windows VSS / shadow copies are usually deleted (vssadmin delete shadows /all) but NOT always – tryshadowcopy-viewerorvssadmin list shadowsBEFORE cleanup.
– Volume-repair tools (PhotoRec, R-Photo) can carve non-encrypted copies if disk area was not overwritten.
– File-rollback features in OneDrive, DropBox, Code42, Veeam, Druva, etc.
– Paying the ransom (≈ 0.15 BTC) does work according to multiple incident-response firms, but:
• no guarantee,
• rewards criminal activity,
• may violate OFAC sanctions if attacker wallets are flagged.
4. Other Critical Information
-
Unique characteristics:
– Uses “bring-your-own-chacha” – statically links the encryption routine, unusual for small ransomware families, indicating a higher-skilled developer.
– Drops a secondary “wiper” module (ebk_wipe.exe) that overwrites free clusters with random bytes – executed IF the victim waits > 96 h, lowering recovery odds.
– Contains a hard-coded killswitch domain (ebkprslvr.onion) – unreachable unless Tor is present; does NOT stop encryption but may change ransom note wording. -
Broader impact / notable effects:
– MSP breakouts in East-Asia (Feb–Mar 2024) caused > 520 downstream customers to lose file-servers in a single weekend.
– Healthcare clinics in the U.S. Midwest reported permanent loss of radiological images (DICOM) where only partial off-site backups existed – HIPAA breach notifications filed.
– Because binary contains embedded check for Russian & Ukrainian keyboard layouts, some analysts link ebaka to a Russian-speaking RaaS group renting ScreenConnect access, but no definitive attribution yet.
Stay vigilant, patch early, and keep immutable backups – remediation will remain difficult until either law enforcement seizes the backend keys or researchers uncover a cryptographic flaw.