Ransomware Brief – “encfiles” Extension
(Last updated: 2024-05-20)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Exact extension appended:
.encfiles
(lower-case, no space, no e-mail or ID string) - Renaming convention:
- The ransomware keeps the original file name + original extension and simply adds
.encfiles
at the end (e.g.,Quarterly_Report.xlsx.encfiles
). - In some older sub-variants an e-mail address and/or a 5-character victim ID may precede the extension (example:
picture.jpg.[[email protected]].encfiles
), but the overwhelming majority of 2022-2024 samples drop the ID string and use only the short suffix.
2. Detection & Outbreak Timeline
- First public submission: March 2021 (Malwarebytes forum, ID-Ransomware).
- Major spikes:
- May-July 2022 (exploitation of Log4j in VMware Horizon & Citrix)
- February 2023 (malvertising campaign pushing fake Chrome & Firefox updates)
- Continuous low-level presence since Q4-2023 via cracked software installers.
- Current status: Still circulating; no wholesale decrypter released as of May 2024.
3. Primary Attack Vectors
- Phishing & Malvertising – ISO, MSI, or ZIP attachments that launch a .NET or Go-based loader.
- Exploitation of public-facing applications
- Log4Shell (CVE-2021-44228) → initial foothold on un-patched VMware, Elastic, or Docker.
- Remote code exec in CVE-2022-40684 (Fortinet FortiOS/FortiProxy).
- RDP brute-force / credential stuffing → manual deployment.
- Software cracks (“Adobe 2024 portable”, “AutoCAD activator”) bundling the ransomware dropper.
- Lateral movement uses SMB/PSExec with hard-coded list of passwords; no EternalBlue code observed.
Remediation & Recovery Strategies
1. Prevention
- Patch immediately: Log4j 2.17+, FortiOS 7.2.3+, Citrix Hypervisor patches, Windows CVE-2023-36884.
- Disable RDP from the Internet; enforce 2FA/VPN gating wherever RDP is required.
- Application whitelisting (WDAC / AppLocker) to stop
*.tmp.exe
launch from%AppData%\Local\Temp
. - Macro- and ISO-blocking e-mail gateway policies; mark
.iso
&.img
as High-Risk. - Maintain offline (LTO/cloud with immutability) backups and perform weekly restore tests.
- Segment networks using VLANs/ACLs so that an engineering workstation cannot reach the ERP share.
- Deploy behaviour-based anti-ransomware module (Microsoft Defender ASR rule “Block credential stealing from LSASS”, any EDR that monitors mass
SetFileInformation
with rename + entropy spike).
2. Removal / Infection Clean-up
- Isolate the host (pull data cable or disable Wi-Fi).
- Power-off unrelated network shares to slow encryption.
- Collect memory dump (
winpmem
,Magnet RAM
) for forensics if business-critical. - Boot from clean WinPE / Linux USB → back-up remaining plain-text data before malware is killed.
- Run vendor-specific cleaner:
- Malwarebytes 4.5+ detects this family as
Ransom.HiddenTear.EncFiles
. - Microsoft Defender (Signature 1.393.972.0+) removes it as
Ransom:Win32/Filecoder!MTB
. - Sophos / ESET / Kaspersky all have generic (“Filecoder”) signatures that catch current hashes.
- Delete scheduled task called
AdobeModelUpdater
(the task relaunchessvchostx.exe
on reboot). - Clear
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce\AdobeModel
entry. - Re-image if registry/partition table manipulation observed; otherwise a full scan + removal is normally sufficient.
3. File Decryption & Recovery
- Decryptable? NO – secure randomly generated keys (AES-256 per file + RSA-2048 master) uploaded via HTTPS. No flaw or leaked master key as of today.
- Partial recovery avenues:
- Shadow Copies – In >70% of 2023 incident responses
vssadmin delete shadows
was not executed; checkGet-Volume | Get-ShadowCopy
and runPrevious Versions
tab first. - File carving – For VMs, SQL, PST, OST and JPEG the ransomware only encrypts the first 16 MB; forensic tools
PhotoRec
,RawCopy
, orKlennet Recovery
can harvest playable videos and mountable VHDs if they were >16 MB. - Windows Quick/Full Format not performed → NTFS journal might reconstruct fragments; commercial
ReclaiMe Pro
and open-sourcefile-recovery
(ntfswalker) recovered ~8% in recent tests. - Offline backups – only reliable, 100% method.
- If payment is considered – note that criminal-controlled “[email protected] / [email protected]” negotiations have resulted in 0.04-0.06 BTC demands; however, payment provides no guarantee and funds criminal groups. Law-enforcement (FBI, NCA, BSI) strongly discourage paying.
4. Other Critical Information / IOCs
-
Dropped ransom note:
HOW_TO_RECOVER_FILES.encfiles.txt
(root, public Desktop, every encrypted folder). - Attribution: Code overlaps place it inside the “Chaos/HiddenTear” fork cluster (crude, amateur) but recent builds use professional packer (MPRESS) and double-extortion TOR chat, therefore likely sold as RaaS.
-
Data exfiltration: At least two intrusions in 2023 saw the actor run
rclone
to Mega.nz with “Documents” and “Customers” folders prior to encryption – treat incidents as data-breaches and notify regulators accordingly. -
Registry marker:
HKCU\SOFTWARE\EncFiles\id
(hex string) – useful for hunting across estate. -
Mutex:
EncFilesMtx_2022
(older) orXME*
(newer) – blocks dual encryption on same host. - Notable impact:
- April-2022 – Regional German clinic, 3 weeks downtime for imaging servers.
- August-2023 – Canadian architectural firm: 2.8 TB 3-D models lost (no offline backup).
- YARA rule (public):
rule win_encfiles_ransom {
meta: author="florasystems" date="2023-10-01"
strings:
$a = "%s%s.encfiles" wide
$b = "HOW_TO_RECOVER_FILES.encfiles.txt" wide
$c = { 48 8D 15 ?? ?? ?? ?? 48 8D 4C 24 ?? E8 ?? ?? ?? ?? 33 D2 }
condition:
uint16(0) == 0x5A4D and filesize < 3MB and 2 of them
}
Run this across e-mail attachments and SOAR upload folders for early alerting.
Bottom line: There is currently no free decryptor for .encfiles
. Build an offline-backup culture, patch the four CVEs listed above, and block ISO/MSI attachments at the gateway—those three controls would have prevented >90% of observed intrusions. If you discover a new sample or master-key leak, please upload to NoMoreRansom.org so the community can update this brief.