Everbe Ransomware Family (.everbe
, .thunder
, .embrace
, .pain
, .volcano
, etc.)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmed extensions ever observed in the Everbe隊列:
–.[[email protected]].everbe
–.thunder
–.embrace
–.pain
–.volcano
–.[[email protected]].twist
–.light
–.babyk
–.quiet
-
Typical renaming convention:
Original:Quarter-Q2.xlsx
After encryption:Quarter-Q2.xlsx.[<unique-id>][<contact-e-mail>].<chosen-extension>
Example:Quarter-Q2.xlsx.[B4DA0BEF][[email protected]].everbe
The malware keeps the original file name, original extension, appends a 8-byte hex ID, the attacker e-mail address in square brackets, then the family-specific suffix. Directory-borne ransom notes are dropped as
!=How_to_decrypt_files=!.txt
or similarly named plain-text files.
2. Detection & Outbreak Timeline
-
First public sample: April 2018 (
.everbe
variant). -
Major campaigns:
– May-July 2018 – spam “job-application” wave distributing.embrace
.
– August 2018 – pseudo-South-Korean “browser patch” dropper pushing.thunder
.
– November 2018 – RDP brute-force clusters planting.pain
.
– March 2019 –.babyk
build spread via cracked-software forums.
– June 2021 – affiliate switch to “.quiet”; still circulating opportunistically.
3. Primary Attack Vectors
- RDP brute-forcing / credential stuffing (most common infection path).
- Malspam: fake invoices, resumes, COVID-19 forms carrying ISO/IMG → LNK → PowerShell → Everbe payload.
- Exploit kits (Rig, Fallout 2018 builds) – Flash/Silverlight CVE-2018-4878, CVE-2016-0189.
- Software cracks & keygens posted to warez sites (Babyk, Volcano).
- No large-scale SMB exploit (EternalBlue) ever tied to Everbe – operators are financially-driven “human-operated” attackers, not worm-style.
- Lateral movement performed manually with Cobalt Strike, PsExec, WMI once an RDP session is obtained.
Remediation & Recovery Strategies
1. Prevention
-
Disable RDP if unused; otherwise enforce:
– Network Level Authentication
– 2-FA (Azure AD, Duo, etc.) or at minimum IP-whitelisting, account lock-out 3/30 policy, strong 14+ character passwords. - Segment networks – block TCP/135,139,445,3389 between user VLANs.
- Patch public-facing software (Flash, Silverlight, browsers, MS Office, VNC, AnyDesk).
- Disable Office macros by GPO; block ISO/IMG at the mail-gateway; use the “Mark-of-the-Web” bypass mitigations released by Microsoft (ADV220001).
-
Backups 3-2-1 rule: offline/off-site copy with immutable object-lock. Everbe searches and deletes Volume Shadow copies (
vssadmin delete shadows /all
) so backups must be outside the authenticated domain. -
Application whitelisting (Windows Defender Application Control or AppLocker) blocks unsigned executables launched from
%TEMP%
and%APPDATA%
.
2. Removal (step-by-step)
- Physically isolate the machine; remove Ethernet/Wi-Fi.
- Collect triage: full memory dump, prefetch, Master File Table, Event logs before any reboot.
- Boot trusted incident-WinPE (Kaspersky Rescue, ESET SysRescue) → back up encrypted data first (in case removal damages files).
- Run reputable AV engine with Everbe signatures (Microsoft, ESET, Kaspersky, Sophos, Bitdefender all detect it generically as Ransom:Win32/Everbe, Troj/Ransom-EW, etc.).
-
Manual cleanup leftovers:
– Scheduled tasks"Bvhost.exe"
,"MicrosoftUpdate"
– Service entries referencing random-named*.exe
under%ProgramData%
or%APPDATA%
.
– Registry Run keys containing hard-coded e-mail address (everbe@safesuremail, [email protected]). - Patch the initial vector (reset breached account, install OS updates).
- Only after the environment is declared clean proceed to restore or decrypt.
3. File Decryption & Recovery
- Everbe is an “OFFLINE” ransomware family – it generates a per-victim symmetric key, encrypts with RSA-1024 public key embedded in the binary. The corresponding private RSA key is held ONLY by the attacker.
- No free universal decryptor exists – Kaspersky’s Rakhni, Emsisoft, Avast, nor NoMoreRansom currently hold compatible keys.
- Shaded attempts to “brute” 1024-bit RSA are computationally infeasible.
-
Recovery path:
– Restore from clean offline backup.
– If no backups exist, store the encrypted data and ransom note in cold storage; occasionally criminals release master keys years later (hasn’t happened yet for Everbe).
– You can contact incident-response firms to negotiate/purchase the private key – expect demands 0.1-0.3 BTC for individuals, 1-5 BTC for businesses. - For the unrelated “Everbe 2.0 – Decryptor” scam pages: do NOT download “free decrypt tools” offered by 3rd-party blogs; many bundle data-stealers.
4. Other Critical Information
-
Unique characteristics:
– Everbe is “human-operated” not a worm – each attack is customised; ransom notes therefore contain varying contact addresses and differing Bitcoin wallets, complicating IOC block-lists.
– The Trojan will not encrypt files < 30 bytes,*.exe
,*.dll
in%WINDIR%
, or any file/folder containing stringbackup
(trying to avoid destroying its own dropped note and victim backups on same drive).
– It clears another criminal group’s ransomware (Scarab) if present – balling victims twice is bad for “business”. -
Wider impact:
– Concentrated against small-medium business in Asia, Eastern-Europe, South-America.
– Attackers collect and publish 2-5 % of stolen victim files on Tor “leak blog” when r unpaid, introducing a mild data-breach risk on top of encryption.
Key Verdict
Everbe is still active, decryptable only with the attacker-held private RSA key. Your best and cheapest option is: prevent, detect early, and have tested offline backups. If already hit, remove the malware cleanly, rebuild the systems, restore data, then implement the prevention checklist above—do not rely on a free decryptor that currently doesn’t exist. Stay safe, patch well, and keep one copy of your backup where ransomware can’t reach it.