Ransomware Report – “.enciphered” Variant
(Community Edition – last updated 2024-06)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Exact extension added:
.enciphered
(lower-case, no space, appended after the original extension). -
Renaming convention:
original_name.original_ext.[victim_ID].enciphered
Example:Invoice_G2024.pdf → Invoice_G2024.pdf.9A7B3C.enciphered
The 6-byte victim ID is randomly generated on first run and stored in the registry (HKLM\SOFTWARE\Enciphered\victim_id
). -
Dropped marker file:
HOW_TO_RESTORE_FILES.enciphered.txt
(identical text in every folder).
2. Detection & Outbreak Timeline
-
First public submission: 2023-09-14 (MalwareBazaar hash
ed11a4…
). - Peak activity window: October 2023 – January 2024; sporadic campaigns still observed in Q2-2024.
- Clustering: Most samples compile-timestamp within 24 h of campaign, indicating frequent rebuilds to evade AV.
3. Primary Attack Vectors
- Phishing with ISO/IMG lures – e-mails impersonating “Voicemail” or “Document Cloud” contain an attached ISO;挂载后ISO内包含一个被混淆的.NET加载器,最终释放Enciphered有效负载。
- ** vulnerable, public-facing RDP** – brute-forced or bought credentials; once inside, PsExec + batch script pushes the ransomware to every reachable host.
- Drive-by via Raspberry-Robin worm – existing RB infection pulls Enciphered via TOR-based DLLs (observed Q1-2024).
- Exploitation of Citrix NetScaler (CVE-2023-3519) – used for perimeter entry in at least three manufacturing victims.
Remediation & Recovery Strategies
1. Prevention
- Disable SMBv1 / apply MS17-010 (EternalBlue patch) – Enciphered uses SMB for lateral movement even though it does not exploit EthernalBlue directly.
- Enforce 2FA on ALL remote-access paths (RDP, VPN, Citrix).
- E-mail gateway: strip ISO/IMG, VBA, and JavaScript; require MFA for mailbox rule changes.
- GPO to block Office macros from the Internet; disable Mark-of-the-Web bypass.
- Network segmentation + ADC rule: deny SMB/445 between user VLANs.
- Deploy modern AV/EDR with behaviour-based ransomware shield (e.g., Defender ASR rules: “Block credential stealing from LSASS”, “Block process creation from Office”).
- Immutable, hybrid backups (3-2-1) – at least one copy off-line / write-once.
2. Removal (Step-by-step)
- Power-off effected Windows hosts or isolate at network level to stop encryption thread.
- Boot a clean Windows PE / Linux AV-rescue USB.
- Remove persistence:
- Scheduled task
EncipheredTask
→C:\ProgramData\SrvHlp\enciphered.exe /s
- Run keys:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\\EncipheredSupport = SrvHlp\enciphered.exe
- Delete malware folder:
C:\ProgramData\SrvHlp\
andC:\Users\Public\Libraries\hib3.dll
. - Clear rogue local accounts:
net user tmpbackup$ /del
. - Patch the intrusion vector (reset breached AD creds, apply Citrix ADC patch, etc.).
- Run a full AV/EDR scan ×2 to verify clean baseline.
- ONLY AFTER the environment is declared clean, proceed to restore data – do NOT log-in with domain-admin prior.
3. File Decryption & Recovery
- No flaw found (yet): AES-256-CBC + random 256-bit key, RSA-2048 public-key encryption of that AES key. Keys are uploaded to attacker server; no offline decryption tool exists.
-
Victim portal:
<victim_ID>.enciphered247[.]com
(TOR mirror). Ransom demand averages USD 1.2 M (Oct-2023) – negotiable down to ~0.4 M. - Free decryptor: None (verified by NoMoreRansom, Emsisoft, Avast).
- Recovery path: rebuild from offline backups or negotiate+test decrypt only if no backup and business-critical.
-
Essential tools/patches:
– Bitdefender “EncipheredClean” disinfection utility (sig v1.7, 2024-03-27).
– MS patch roll-up for CVE-2023-3519 (Citrix), KB5028477.
– MS Defender ASR template “Ransomware protection” (group policy import).
4. Other Critical Information
- Data exfiltration: The ransomware drops “ExFil.exe” (Go-based) and uploads ~50 GB of “interesting” file-types (xlsx, dwg, qbwp, sql, pdf) BEFORE encryption. Even if you restore from backup, attackers threaten to publish.
-
Kill-switch: creating the mutex
Global\EncipheredWipeMutex2023
will prevent the wiper/deletion routine; useful during IR but does NOT stop encryption. - Avoid double-extortion: treat every incident as a data-breach – preserve logs, engage legal counsel, notify regulators/customers within 72 h where required.
- Notable oddity: If the language pack is Russian or Ukrainian the binary self-deletes (typical geopolitical check).
- Wider impact: Over 110 confirmed victims across 27 countries; manufacturing and legal verticals top the list; average downtime 9.3 days (Palo Alto Unit 42, 2024-04 report).
Bottom line: “.enciphered” is a mature, double-extortion ransomware. Assume backups are your ONLY reliable escape hatch—keep them offline, encrypted, and routinely test restore.