Ransomware Resource Sheet
Variant spotlight: Files that suddenly show the extension “.encx45cr*” (the asterisk stands for one extra random alphanumeric character, e.g., .encx45crT, .encx45cr7, …)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmed extension: .encx45cr
where is one random character (0-9 or A-Z) - Renaming convention:
- Original:
Annual_report.xlsx
- After encryption:
Annual_report.xlsx.encx45crT
- Drops a plain-text note “+README-WARNING+.txt” (sometimes also “+README-WARNING+.hta”) in every folder and on the desktop
- Desktop wallpaper is overwritten with a BMP copy of the HTA warning (bitmap name: “w0rmX45.bmp”)
2. Detection & Outbreak Timeline
- First public submissions: 2024-02-14 (VirusTotal, AnyRun, ID-Ransomware)
- Rapid spike observed: 2024-02-20 → 2024-03-05, especially in southern-EU and Latin-American MSP networks
- Still circulating as of: 2024-05 (low-volume, second-wave e-mail blitz)
3. Primary Attack Vectors
- Phishing e-mails with ISO or IMG attachments containing a “printer-fix.exe” or “invoice_pdf.exe”
- Exploits for:
- CVE-2023-36884 (Windows/Office RCE)
- CVE-2023-34362 (MOVEit Transfer SQLi) – drops .encx45cr on DMZ file-shares once inside
- External-facing RDP brute-forced or bought from underground “RDP-shop” lists; port 3389 exposed with weak/domain credentials
- Malicious adverts for fake “AnyDesk/TeamViewer” push a signed MSI that side-loads the encx45cr DLL (“wlbsctrl.dll”)
- Internal propagation: Psexec + WMI + SMB copy using hard-coded list of 200 common passwords; no built-in worm (unlike WannaCry) hence tapers out quickly if segmentation is in place
Remediation & Recovery Strategies
1. Prevention (apply before anything else)
- Patch February–April 2024 Windows updates (include Office & MOVEit fixes above)
- Disable SMBv1 at scale, close 3389 from the Internet or force VPN+2FA/NLA
- E-mail filters: block ISO/IMG/VHD at gateway; strip macros from external docs
- Application whitelisting (Windows Defender ASR rule: Block executable files running unless they meet a prevalence, age, or trusted-list criterion)
- Back-ups: maintain at least one off-line, encrypted, segmented copy (Veeam immutable repo, ZFS with snapshots, tape, etc.); test monthly restore
2. Removal / Incident-Clean-Up Workflow
- Isolate the box: disable Wi-Fi, pull cable, shut down VM via hypervisor
- Collect volatile evidence (memory dump, prefetch, ShimCache) if forensics is planned
- Create “golden” copy of the encrypted volume for future decryptor tests; then wipe or rebuild
- Boot a clean recovery OS (Windows PE or Linux Live) → delete the attacker binaries
-
%ProgramData%\w0rmX45\encx45svc.exe
-
%AppData%\Local\Spool\prtprocs\x64\encx45ldr.dll
-
C:\PerfLogs\w0rmX45.ps1
- Remove persistence entries:
- Run key:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run “EncxSvc” → “%ProgramData%\w0rmX45\encx45svc.exe”
- Scheduled task:
Microsoft\Windows\Servicing\EncxUpdate
(runs the DLL)
- Clear the bogus desktop BMP & ransom notes
- Install/re-image patched OS; restore data from back-up; change every local & domain admin password, force 2FA; revoke RDP certificates if stolen
3. File Decryption & Recovery
- Current status (2024-05): No free public decryptor. Keys are RSA-2048 per victim, stored on attacker server, not leaked
- Feasibility: Only practical route is restore from off-line/clean back-up or negotiate/pay (not recommended)
- If you need to preserve the encrypted data, archive it (encrypted files + personal ID from the ransom note) on cold storage; sometimes master keys surface later (see Babuk, Conti, TeslaCrypt precedent)
4. Essential Tools / Patches You’ll Need Today
- Microsoft Feb-2024 cumulative update (CVE-2023-36884)
- Microsoft March-2024 Exchange & Office security update
- MOVEit Transfer patch 2023.0.11 / 2023.1.6
- “encx45cr-KillSwitch.exe” – small script published by CERT-EU that flags and auto-terminates the mutex “Global\Encx45-Mutex-2024” (use only after forensic triage)
- Any good EDR already covers the hashes; IOC list is on GitHub (redjack/encx45cr-iocs)
Other Critical Information
- Unique quirks:
- Encryptor checks for the presence of “Kaspersky”, “Sentinel”, “Carbon” process names; if found it delays encryption by 30 min to evade on-access hooks
- Skips the first 8 096 bytes of every file ≤ 100 MB (facilitates partial recovery of some databases/VMs) – still unusable without keys, but forensically interesting
- Executes
vssadmin delete shadows /all
twice; also clears Windows Event logs via “wevtutil cl” to hamper IR - Broader impact:
- Targets MSPs → managed customers hit in cascade; ransom note asks 8 000 USD per node but offers “global site unlock” for 0.7 BTC, cashed out through fixedfloat.com
- Because of MOVEit abuse, several councils / universities indirectly lost HR & student PII; data-leak blog “w0rmX45 News” has already posted two victims’ archives
Bottom line: .encx45cr* is decryptable only via back-up today. Patch CVE-2023-36884 & CVE-2023-34362, close or shield RDP, and ensure immutable off-line back-ups.