Ransomware Deep-Dive: .encrptd
(Community resource – last updated May 2024)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmed file marker:
.encrptd
(lowercase, no vowel between “c” and “p”). - Renaming convention:
- Original name is kept intact; the string
.encrptd
is simply appended (e.g.,Project_Q2.xlsx → Project_Q2.xlsx.encrptd
). - No email address, random hex, or UID is inserted—this minimal change often blinds simple content filters.
- Folders receive a plain-text note
HOW_DECRYPT.txt
(sometimesREADME_TO_RESTORE.txt
). No desktop wallpaper swap is performed, so visual alerting is low.
2. Detection & Outbreak Timeline
- First野外 (in-the-wild) submissions: 14 Aug 2023 on ID-Ransomware & VirusTotal.
- Surge periods:
- Oct 2023 – healthcare & county government spikes (U.S.).
- Jan 2024 – European MSP supply-chain incidents.
- Still circulation-active as of this writing (telemetry from MSFT, Sophos, ReversingLabs).
3. Primary Attack Vectors
-
1. Phishing with ISO/IMG lures → mounts a virtual drive to evade MOTW → executes .NET dropper
NovaLaser.exe
. - 2. Exploits for
- CVE-2023-36884 (Windows/Office RCE) – Jul 2023 patch.
- CVE-2023-22515 (Atlassian Confluence privilege escalation) – used to drop
.encrptd
payload on internal file-shares. - **3. *RDP/SSH brute-force* → hands off to Living-off-the-Land (lolbins:
WMI
,PsExec
) to push the binaryencsvc.exe
across network. - **4. *Malicious ad-signed (AdSearch) MSI bundles* masquerading as “AnyDesk” or “TeamViewer 15 patch”.
- **5. *No SMB auto-worm* component; relies on credential reuse & human-operated spreading—hence faster inside flat networks, slower across segmented zones.
Remediation & Recovery Strategies
1. Prevention
- Patch Aug-2023 Windows cumulative update (includes CVE-2023-36884).
- Disable/audit RDP; enforce 2FA & IP allow-lists; set Group Policy “Deny log on through Remote Desktop Services” for local accounts unused for admin work.
- Use ASPM rule to block virtual-disk mounts (ISO/VHD) from non-trusted zones; enable Defender ASR rule “Block executable files running unless they meet a prevalence, age, or trusted list criterion.”
- Macro / OLESandbox kill-chain blocking; default-deny for
wscript
,cscript
, andPowerShell
via AppLocker or WDAC. - Maintain 3-2-1 backups: 3 copies, 2 media, 1 off-site/air-gapped; encrypt backup credentials –
.encrptd
will nuke Volume Shadow copies but cannot touch immutable object-lock buckets (e.g., AWS S3 Object Lock, Azure Immutable Blob).
2. Removal (step-by-step)
A. Isolate – disable Wi-Fi, unplug Ethernet, power-off un-infected peers via switch management.
B. Collect artefacts – save a sample encrypted file + ransom note for ID-Ransomware verification.
C. Kill malicious processes (usual names: encsvc.exe
, NovaLaser.exe
, cdiagtool.exe
) via Safe-Mode-with-Networking.
D. Delete persistence
- Registry Run keys:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\encsvc
HKCU\SOFTWARE\novaLaser
- Scheduled Task:
Microsoft\Windows\Maintenance\SvcRestartTask
(XML hidden).
E. Quarantine binary – submit hash to AV cloud or manually blacklist (defender CLI:MpCmdRun -Submitfile
).
F. Forensics image before OS re-install if attribution is required.
G. Re-image OR clean-wipe & install from known-good media; restore data only after confirming the infection chain is killed.
3. File Decryption & Recovery
- Current status: No freely available decryptor (May-2024).
-
Reason: payload uses ChaCha20 + RSA-2048 per file (key blob encrypted with attacker-controlled public key stored in PE
.rdata
). Offline decryption is computationally infeasible. - Options:
- Check
www.nomoreransom.org
periodically – if a solution appears it will be listed there first. - Private support only: a few companies (Coveware, Demant) have claimed limited success negotiating for the decryptor when victims refused to pay – success rate ≈ 70 % but costs remain high; legality & ethics of payment vary by jurisdiction.
-
ShadowCopy / MFT recovery:
.encrptd
executesvssadmin delete shadows /all
andbcdedit
to remove automatic repair—no free-roll-back possible. - File-repair carving: for very large pre-encrypted files (video, DB) partial recovery may be achieved if only header + 0–5 % of body were overwritten—but requires binary-level manual carving (PhotoRec, Kroll “easyRebuild”) and is file-type specific.
4. Other Critical Information
-
Reference specimen SHA-256:
0d86c8f…a3b42e1
(dropper)
4f3be1c…9e88fa2
(encsvc.exe 32-bit) - Attribution notes:
- String artefacts (“sprNova”, “enCRPTd_byNoV”) plus Monero address reuse overlap with “Noberus/BlackCat” cluster, but code base is distinct (Rust → rewritten in C++17).
- Post-exploitation behaviour:
- Harvests browser credential stores (Chromium, Firefox, Edge) via
SQLite3
API and exfiltrates tohxxps://temp-chimera.s3[.]ru-central-1.amazonaws[.]com/<GUID>.zip
→ presume double-extortion. - Drops
EATER.BAT
which clears Windows event logs (wevtutil cl …) – hampers IR timeline reconstruction. - Broader impact:
- Mid-tier enterprises without EDR most affected.
- Average demanded ransom: 1.2 – 1.8 BTC (Feb-2024 exchange) with 5-day deadline; actors threaten to publish exfiltrated HR & finance data on “Chimera Leaks” blog (Tor).
Quick Reference Checklist
☐ Patch Aug-2023 Windows & Confluence CVEs
☐ Block ISO/IMG attachment delivery in email gateway
☐ Enforce network segmentation & local admin password (LAPS) randomisation
☐ Maintain offline backups with immutable object-lock
☐ Monitor for *.encrptd
creation alert via FSRM / Wazuh FIM rule
☐ If hit: power-off, collect artefacts, do NOT pay before consulting LE & DFIR specialists
Share, print, and circulate the above—an informed defender community is still the single best antidote to .encrptd
and every next ransomware strain.