{"id":1773,"date":"2021-06-14T15:13:25","date_gmt":"2021-06-14T06:13:25","guid":{"rendered":"https:\/\/cyberenso.jp\/?page_id=1773"},"modified":"2021-07-05T20:46:19","modified_gmt":"2021-07-05T11:46:19","slug":"dharma-ransomware","status":"publish","type":"page","link":"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/dharma-ransomware\/","title":{"rendered":"Dharma Ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1773\" class=\"elementor elementor-1773\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c64478e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c64478e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-594c249\" data-id=\"594c249\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5047771 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"5047771\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">DHARMA (CRYSIS) RANSOMWARE<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b70b585 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b70b585\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7a885d2\" data-id=\"7a885d2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7ae264 elementor-widget elementor-widget-image\" data-id=\"a7ae264\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?fit=700%2C400&amp;ssl=1\" title=\"ransomware-2321665_1920\" alt=\"ransomware-2321665_1920\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7b74a56 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b74a56\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fc90546\" data-id=\"fc90546\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e02419 elementor-widget elementor-widget-text-editor\" data-id=\"4e02419\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Introduction<\/span><\/strong><\/h4><p style=\"text-align: left;\">Dharma ransomware which is also known as Crysis made its first appearance in 2016 as it was being manually delivered by exploiting Remote Desktop Protocol (RDP) services via TCP port 3389 and then the target computer would be brute forced to gain access.<br \/>Attacks involving the Dharma ransomware have been frequent and have been recorded to target organisation of small &#8211; medium size from many countries including Russia, Japan, China, and India.<br \/>There is no decryptor for any of the active variants of the Dharma ransomware and the average ransom required is $5k in DASH which can be paid via provided email addresses in the ransomware note.<\/p><h3 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Modus Operandi<\/span><\/strong><\/h3><h5 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Initial access<\/span><\/strong><\/h5><p>The threat actor usually delivers Dharma by exploiting Remote Desktop Protocol (RDP) services via TCP port 3389 and brute force the password to gain access to a computer. Although there have been recorded cases of Dharma being distributed as malicious attachments in spam emails and disguised as installation files for legitimate software, including AV vendors. In the cases of it being delivered as a malicious attachment, Dharma uses double file extensions, which made it appear to be non-executable under default Windows settings. So, the victims are tricked into clicking it due to them thinking it is non-malicious as it seems to be non-executable.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ac3bd63\" data-id=\"ac3bd63\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06e393c elementor-widget elementor-widget-text-editor\" data-id=\"06e393c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h5><strong>Installation<\/strong><\/h5><p>As soon as Dharma Trojan dropper is executed, installs two files: ns.exe (a network enumeration and scanning tool) and processhacker.exe (System administrator tool). ns.exe is used to scan for network shares, open ports, and services which can used to move within the network. And processhacker.exe is used to disabling Antivirus software and other security services. Then the Dharma executable is dropped under the name of \u201cwinhost.exe\u201d and creates a registry entry to sustain a presence in the system and then Dharma deletes all the Windows shadow copies by running the vssadmin.exe On some Windows versions, it has been observed that Dharma has also attempted to run itself with administrator privileges to find a longer list of files that can be encrypted. <br \/>Dharma attempts to propagate through the network by applying a Default Domain Policy via a compromised Domain controller that will run the \u201cwinhost.exe\u201d on each machine that starts up. <\/p><h5><strong>Encryption<\/strong><\/h5><p>Dharma encrypts files in fixed, removable, and network drives using AES-256 combined with RSA-1024 asymmetric encryption algorithm.<\/p><h5><strong>Command and Control<\/strong><\/h5><p>The dropper may send information about compromised machines and encrypted files. \u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DHARMA (CRYSIS) RANSOMWARE Introduction Dharma ransomware which is also known as Crysis made its first appearance in 2016 as it was being manually delivered by exploiting Remote Desktop Protocol (RDP) services via TCP port 3389 and then the target computer would be brute forced to gain access.Attacks involving the Dharma ransomware have been frequent and have been recorded to target<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":1838,"parent":3201,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1773","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/1773"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=1773"}],"version-history":[{"count":21,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/1773\/revisions"}],"predecessor-version":[{"id":3358,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/1773\/revisions\/3358"}],"up":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/3201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/1838"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=1773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}