Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.everbe
,.everbe 2.0
, or (in later campaigns).[[email protected]].everbe
. -
Renaming Convention:
Victim files are renamed in one of two ways, depending on the campaign:
- Original name is kept but the extension is simply replaced with
.everbe
Example:Quarterly-Report.xlsx
→Quarterly-Report.everbe
- Address-tagged variant adds the attacker’s e-mail inside square brackets before the final extension
Example:Quarterly-Report.xlsx
→[[email protected]].Quarterly-Report.everbe
2. Detection & Outbreak Timeline
- Approximate Start Date/Period:
- First samples seen in the wild: late April 2018
- Peak distribution window: May – August 2018; sporadic re-appearances until Q1-2019.
- Malware-family clustering: Everbe is considered a “fork” of the-still-alive Saturn ransomware; both share >80 % code overlap.
3. Primary Attack Vectors
- Propagation Mechanisms:
- Phishing mail with double-extension or RTF attachments. Common lure themes: “Payment copy”, “New order”, “Voice message from Avaya”.
- Cracked-software bundles uploaded to file-sharing sites (warez, KMS-pico, Adobe cracks).
-
Brute-forced / leaked RDP credentials. Attackers manually drop the payload as
C:\Users\Public\svchost.exe
and execute withRundll32
. - No built-in network self-spreader. Once inside, adversaries perform lateral movement with PsExec / WMI to stage the executable on every reachable machine before triggering the encryption.
- No CVE-specific exploit chain; the group relies on social engineering and credential reuse, not on SMB/EternalBlue-type worms.
Remediation & Recovery Strategies
1. Prevention
- Proactive Measures:
- Disable RDP exposure on TCP/3389 to the Internet; enforce 2-Factor VPN for remote access.
- Mandate that e-mail gateways strip macro-enabled Office files (
.docm
,.xlsm
) and double-extension attachments. - Deploy application whitelisting (WDAC / Applocker) blocking execution from
%TMP%
,%PUBLIC%
, or user-writable shares. - Patch third-party products (WinRAR ≤ 5.60, Adobe, etc.) because Everbe is frequently bundled with fake “keygens” that exploit users’ tolerance for pirated software.
- Keep offline, versioned backups (3-2-1 rule). Everbe deletes VSS shadows (
vssadmin delete shadows /all
) so proxy-based snapshots (ZFS, immutable S3-ObjLock, Acronis Cyber-Cloud, etc.) are essential.
2. Removal
- Infection Cleanup (step-by-step):
- Physical or network isolation of the affected host to prevent last-stage lateral movement.
- Collect a triage package (MFT, EVTX, memory dump) for forensics before first reboot.
- Boot into Safe-Mode-with-Networking or a WinPE USB.
- Delete residual artefacts:
- Executable:
C:\Users\Public\svchost.exe
(or path from ransom notes). - Autorun entry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run → svcHost
. - Scheduled task
EverbeService
if one is present.
- Executable:
- Run a full scan with an offline AV rescue disk (Kaspersky, ESET, Windows Defender Offline) to remove any dropped backdoors (Kpot, Aundo, or Dridex often accompany Everbe).
- Patch credentials: force AD password reset for every account logged on during the incident; analyze NTDS.dit for evidence of credential dumping.
3. File Decryption & Recovery
-
Recovery Feasibility:
-
No flaw exists in Everbe’s Salsa20 implementation; therefore no free universal decryptor is available.
-
Under limited circumstances partial recovery is possible:
- If the campaign used a hard-coded key (a few early builds) you can test the Saturn-Everbe decryptor tool released by Emsisoft (v2018-07-03) against a dummy copy of encrypted data.
- ShadowExplorer or PhotoRec can retrieve small Office auto-saves or cached files that escaped the deletion routine.
-
Otherwise the only guaranteed route is restore from offline backups or negotiate with the actor (not recommended; payment does not always yield a working key).
-
Essential Tools/Patches:
-
Emsisoft-Saturn-Everbe-Decrypter (for early variants with leaked keys).
-
Kaspersky RannohDecryptor (does NOT support Everbe but useful for cleaning up prev. ransomware clusters).
-
MS17-010 and current cumulative patches (nevertheless, Everbe rarely uses SMB exploits, patching is still good hygiene).
-
Sysinternals Autoruns, Velociraptor, or GRR for enterprise-wide artefact hunting.
4. Other Critical Information
-
Additional Precautions (what makes Everbe different?):
-
Installs a second-stage stealer (Kpot, Arkei) to exfil browser / crypto-wallet data before encryption; assume data-breach disclosure obligations.
-
Drops ransom notes:
!=How_recovery_files=!.txt
andreadme.txt
. Inside you find the static TOR urlhxxp://kdvm5fd6tn6jsbxtq[.]onion
and an e-mail address (changes each campaign). -
Self-delete after 32-bit execution; 64-bit payloads stay resident – inspect both architectures.
-
Large-file logic: skips only
*.exe
,*.dll
,*.sys
inside%WINDIR%
– virtual-disk (*.vmdk
,*.vhd
) and SQL / Oracle data files are encrypted, so VM-level snapshots are not sufficient. -
Broader Impact:
-
Everbe was overshadowed by bigger 2018 families (GandCrab, SamSam), yet it still hit dozens of SMBs in EU and LATAM, especially local governments who fell for the fake “income-tax refund” lure.
-
Highlighted the cracked-software vector; many victims confessed to using pirated engineering tools, reminding organizations that “shadow-IT installs” remain a top entry point for commodity ransomware.
-
Because Everbe’s operators frequently re-package Saturn’s builder, the family continues to pop up in one-off campaigns – keeping IOC hunting and offline backups relevant long after the original wave.
Bottom line: If you find files bearing .everbe
and no recent, detached, tested backups, treat the situation as a full rebuild + potential credential-breach scenario rather than a straightforward decrypt-and-go recovery.