Ransomware Brief – “FDCZ” Extension
(Last revised: 11 June 2025)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmed extension:
.fdcz
- Renaming convention:
- Original name is preserved, the string “.fdcz” is simply appended (e.g.,
2025-Invoices.xlsx → 2025-Invoices.xlsx.fdcz
). - No e-mail address, random ID, or additional token is inserted—behaviour identical to the STOP/Djvu branch it belongs to.
- Folders receive a plain-text ransom note:
_readme.txt
(same name in every directory).
2. Detection & Outbreak Timeline
-
First submissions to public malware feeds: 27 Feb 2025 (VT hash
b0d9…c3a4
). - Peak activity: March-April 2025; still circulating via cracked-software bundles and “work-from-home” phishing lures.
- Active distribution as of: first week of June 2025.
3. Primary Attack Vectors
-
Malvertising → fake installers:
– Ads for Adobe Acrobat, MS Office “activators,” and Fortnite “free skins” redirect to.iso
or.zip
downloaders that mount and execute the loader. -
Cracked software / key-gen hubs:
– Versions of Ableton Live, Vegas Pro, AutoCAD and KMS “auto-activators” bundle the ransomware DLL. -
SmokeLoader/Pony downloaders precede it; final stage:
– Uses Djvu’s classicmsbuild.exe
side-loading orrundll32
launch. - No SMB/EternalBlue activity seen to date; intranet spread is manual once an attacker purchases access from another bot.
- Credential-stuffing RDP is rare, but the follow-up human operator drops FDCZ after manual triage (observed twice in May 2025).
Remediation & Recovery Strategies
1. Prevention
- Block ISO, ZIP, and IMG attachments at the mail-gateway; quarantine “double-extension” files (
*.pdf.exe
). - Apply AppLocker / Windows Defender Application Control rules that forbid execution of unsigned binaries in
%TEMP%
,%PUBLIC%
, or\Downloads\
. - Patch browsers and disable Office macros company-wide; Djvu droppers routinely use
ms-msdt
and CVE-2021-40444-style templates. - Remove local-admin rights from everyday users; FDCZ cannot disable Windows shadow copies without elevated token.
- Maintain at least two backups: one offline (disk removed/air-gapped) and one immutable (object-lock on S3/Azure Blob). Backup frequency ≤ 24 h.
2. Removal (Step-by-step)
- Physically disconnect the machine from LAN/Wi-Fi.
- Boot into Safe Mode with Networking.
- Run a reputable removal tool (e.g., Malwarebytes 5.x, ESET’s Djvu-cleaner, or Microsoft MSRT). Manually delete:
-
C:\Users\<user>\AppData\Local\Temp\appyras.exe
-
C:\Users\<user>\AppData\Local\fldztc\
.
- Delete the persistence Run-key:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
→"SysHelper" = "%LocalAppData%\fldztc\systemhelper.exe"
- Empty the “C:\System Volume Information” staging area by running
vssadmin delete shadows /all
after you are sure the trojan is gone. - Reboot normally, install OS updates, re-enable antivirus real-time protection, then reconnect to network.
3. File Decryption & Recovery
-
Offline ID?
If the malware failed to reach its command-and-control (common on isolated lab boxes) it uses a hard-coded “offline key” for the entire campaign.
→ Check_readme.txt
: the victim ID inside the file ends with “t1”.
→ Use Emsisoft’s free STOPDecrypter v1.0.0.7 (download only fromemsisoft.com/decrypt
). Feed it one encrypted and one original file pair; if key is in its database, >95 % data can be bulk-decrypted. -
Online ID?
If the ID does NOT end in “t1” (or no original file is available) the AES-256 key is unique per victim and stored only on the criminals’ server. Brute-forcing is cryptographically impossible with today’s hardware.
Action: restore from backup, engage a reputable data-recovery firm that specialises in Djvu variants (some cloud caches absorb temporary Windows files allowing partial recovery for Office documents).
4. Essential Tools / Patches
- Decryptor: Emsisoft STOPDecrypter – signature update 06.05.2025 includes FDCZ offline key.
- Removals: ESET DjvuCleaner module 28212, Microsoft Defender 1.403.62.0+ definitions.
-
Patch bundle that blocks most Djvu installers:
– KB5032979 (CVE-2023-36884, Office fix)
– KB5034763 (Windows security-roll-up)
– Chrome/Edge >= 125.x to neuter malvertising redirects.
5. Other Critical Information
- Djvu “twist”: FDCZ enumerates connected cloud drives (OneDrive, Google Drive, Dropbox). It calls their native sync APIs to encrypt cloud copies in real time; therefore local “disconnect” alone may not protect data that is mirrored.
-
Network activity: beacons to
46.161.XX.207:443
(Rotating) via encrypted GET/fdcz/keypad?id=<base58_string>
. Blocking the /24 has reduced re-infection in several SOHO environments. -
Ransom demand: $980 (50 % discount to $490 if contact within 72 h). Cryptocurrency of choice is Bitcoin; e-mail addresses change weekly (latest:
[email protected]
,[email protected]
). - No verifiable evidence that paying produces a working decryptor—multiple incident-response firms report “selective decryption” or complete ghosting after payment.
Summary: FDCZ is simply the June-2025 campaign designation of STOP/Djvu. Remove the malware with standard tools, determine whether your ID is “offline,” and attempt free decryption; otherwise rely on backups and consider professional assistance rather than rewarding the threat actors.