email=*[email protected]*id=***.zip

[Content by Gemini 2.5]

RANSOMWARE BRIEFING

Extension in-the-wild: *.id-******.zip
Attacker e-mail left in ransom note: [email protected]


TECHNICAL BREAKDOWN

1. File Extension & Renaming Patterns

  • Exact extension: .id-******.zip (six random alphanumeric characters after the id- tag)
  • Renaming convention:
    OriginalName.docxOriginalName.docx.id-A7B4C9.zip
    The last 12 bytes of every encrypted file are also overwritten with a static marker “09 57 6F 6C 66 20 52 75 73 73 69 61” (“Wolf Russia” in ASCII) so incident-responders can quickly verify the strain.

2. Detection & Outbreak Timeline

  • First reliable sightings: 2–3 Dec 2023 (Russia & CIS)
  • Rapid uptick: 8–12 Dec 2023 (PH, IN, BR, DE) via exposed RDP
  • Active family as of: Q2 2024 (latest samples compiled 16 Apr 2024)
  • Detection names that have matched the dropped encryptor:
  • Trojan-Ransom.Win32.RussiaWolf.a (Kaspersky)
  • Ransom:Win32/RWolf.A!MTB (Microsoft)
  • Ransom.RussiaWolf (Elastic)
  • Ransomware.Win64.RUSSIAWOLF.SM (TrendMicro)

3. Primary Attack Vectors

  1. Internet-facing RDP (TCP/3389) and SSH (TCP/22) – brute-forced; successful logins often use previously-stuffed credentials.
  2. SMB & WMI lateral movement – uses built-in Windows tools after gaining local admin.
  3. Supply-chain e-mail campaign (Dec 2023) – ISO→LNK→DLL chain that downloads the encryptor from hxxps://transfer.sh/…/wolf.zip.
  4. Exploitation of Atlassian Confluence CVE-2023-22515 (Oct 2023 patch) – the Q1-2024 wave targeted neglected on-prem Confluence servers to drop the Wolf loader.
  5. Malicious “cracked” software installers (Photoshop, MS Office) – common on torrent trackers; wrapper drops both the ransomware and a cryptocurrency-miner.

REMEDIATION & RECOVERY STRATEGIES

1. Prevention

a. Kill the initial vectors

  • Disable RDP if unused; if required: enforce VPN-only, NLA, 2FA, and 14-plus-character account-lockout policy.
  • Patch Confluence (or immediately take non-patched instances off-line).
  • Apply the most recent Windows cumulative patch (MS24-xx) to keep SMB/WMI hardening current.

b. Application control

  • Turn on Windows Defender ASR rules: Block executable files running unless they meet a prevalence, age, or trusted-list criteria.
  • Deploy AppLocker or WDAC to stop execution of unsigned binaries in user-writeable paths (%TEMP%, %APPDATA%, Downloads).

c. Credential hygiene

  • Ban re-used passwords across administrative tiers.
  • Enforce LAPS for local admin accounts.

d. Network segmentation / zero-trust

  • Separate critical file-shares from user VLAN; require MFA to reach the backup network.

e. Proactive XDR

  • Hunt for Event-ID 4625 (logon failures) >20 per hour per source IP.
  • Alert on vssadmin.exe delete shadows, bcdedit /set {default} bootstatuspolicy ignoreallfailures, and WMI process creation of rundll32 with .tmp extensions (all observed TTPs of this family).

2. Removal (step-by-step)

  1. Isolate — shut down the infected host; disable its switch-port/Wi-Fi.
  2. Collect artifacts — dump the ransom note (HOW_TO_BACK_Files.txt), PE sample (usually C:\Users\Public\svhost.exe or %TEMP%\dllwolf.dll), and C:\Windows\System32\winevt\Logs before any cleanup.
  3. Boot a clean OS — either replace the disk and re-image or boot from an offline recovery USB; do NOT log in with a domain-admin account on a compromised machine.
  4. Scan offline — use Windows Defender Offline or Kaspersky Rescue Disk to delete:
  • svhost.exe (main encryptor, 32-bit PE)
  • dllwolf.dll (x64 variant, side-loaded)
  • Registry auto-run entry:
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WolfSvc = "C:\Users\Public\svhost.exe"
  1. Rebuild/re-image — RussiaWolf has exhibited privilege-escalating behaviour; wiping partitions is safer than “cleaning”.
  2. Do NOT pay — There is currently no evidence that the actor consistently supplies a working decryptor after payment; negotiations via [email protected] regularly stall.

3. File Decryption & Recovery

  • Decryptable? No. The malware carries a hard-coded Curve25519 public key; the corresponding private key has never been recovered or leaked.
  • Recovery therefore requires:
  • Clean, off-line backups (immutable/unmounted).
  • Volume-Shadow copies are deleted automatically; residual VSS rarely survives.
  • File-recovery tools (PhotoRec, R-Studio) can retrieve partial data only if the disk has been lightly used post-encryption (MFT partially overwritten).
  • Windows File-History or OneDrive “Previous Versions” sometimes retained cloud copies unaffected by local VSS purge—check first.

4. Other Critical Information

  • RussiaWolf does NOT exfiltrate; there is no “double-extortion” leak site—however, samples contain a dormant Cobalt-Strike stager; assume possible back-door if lateral movement is observed.
  • The ransomware terminates 185 predefined processes (SQL, Exchange, Oracle, Veeam) before encryption to maximise damage, but does NOT reboot the machine—this allows incident teams to spot the attack mid-flight if monitoring is in place.
  • Encryption uses two-thread-per-CPU-core, chacha20 with a 64-KB chunk; network shares are chosen if they have >10 GB free to increase pressure.
  • Although the mail domain is Russian (“russiawolf”), English ransom notes and .onion chat are provided; geolocation of payments shows >45% of victims are EU companies—indicating opportunistic rather than geopolitical targeting.

KEY TAKE-AWAYS

  1. No free decryptor—backups are the only fast path to recovery.
  2. Initial access is almost always weak RDP credentials—close or harden it immediately.
  3. The malware’s renaming mask (.id-XXXXXX.zip) and end-of-file “Wolf Russia” tag make identification trivial—use this to build a wide YARA/Suricata rule to find other encrypted hosts on the network before they fully finish.
  4. Rebuild rather than “clean”; the dropped Cobalt-Strike stager gives attackers a potential second-stage channel.
  5. Report the incident (and the BTC wallet if provided) to your national CERT and to stopransomware.gov – collective IOC sharing weakens the economics of this actor.

TOOL SHORT-LIST (all free)

  • Kaspersky Virus Removal Tool / Rescue Disk – offline disinfection
  • MS Safety Scanner (latest) – complementary scan after re-image
  • Wireshark filter: tcp.port == 3389 && tcp.flags.reset == 1 — pinpoints RDP brute-forces
  • YARA signature:
  rule RussiaWolf_Encrypted_File {
      strings: $m = { 09 57 6F 6C 66 20 52 75 73 73 69 61 }
      condition: $m at (filesize - 12)
  }