Concrete signature match: Ransomware - Encrypts files and demands payment for 32-bit Windows platform, family Devman
Ransom:Win32/Devman.B is a critical ransomware threat designed to encrypt files across all accessible drives on a compromised Windows system, with capabilities to unmount drives post-encryption. This concrete detection indicates a high-confidence identification of malicious activity.
Relevant strings associated with this threat: - |#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - }#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - |#75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 (NID) - }#75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 (NID) - &|#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - &}#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - y*|#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID) - y*}#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID) - C|#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - C}#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - L|#3b576869-a4ec-4529-8536-b80a7769e899 (NID) - L}#3b576869-a4ec-4529-8536-b80a7769e899 (NID) - |#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID) - }#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID) - |#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID) - }#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID) - |#d3e037e1-3eb8-44c8-a917-57927947596d (NID) - }#d3e037e1-3eb8-44c8-a917-57927947596d (NID) - |#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID) - }#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID)
rule Ransom_Win32_Devman_B_2147945798_0
{
meta:
author = "threatcheck.sh"
detection_name = "Ransom:Win32/Devman.B"
threat_id = "2147945798"
type = "Ransom"
platform = "Win32: Windows 32-bit platform"
family = "Devman"
severity = "Critical"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "2"
strings_accuracy = "Low"
strings:
$x_1_1 = "-skip-local" wide //weight: 1
$x_1_2 = "unmounting drive %c: after encryption" wide //weight: 1
$x_1_3 = "got no path, encrypting all drives." wide //weight: 1
$x_2_4 = {00 78 63 72 79 ?? ?? ?? ?? ?? ?? ?? 64 74 65 64 ?? ?? ?? ?? ?? ?? ?? 6e 6f 74 73 ?? ?? ?? ?? ?? ?? ?? 74 69 6c 6c ?? ?? ?? ?? ?? ?? ?? 5f 61 6d 61 ?? ?? ?? ?? ?? ?? ?? 7a 69 6e 67} //weight: 2, accuracy: Low
condition:
(filesize < 20MB) and
(
((2 of ($x_1_*))) or
((1 of ($x_2_*))) or
(all of ($x*))
)
}359c1e71740dd3ee3556e1c392a72b943960c4f46cf003cd4671775e71788287a0d8032ea8d64e4a7bb6ff292b236955d8239c5826fdcc76b32dbf96cb824acca950a8fdd0d8f7f6e86bd475c3f71381ef4536539e7c50e2aeb6304ae56570e740dbcc2249f5c32ff8aaa62dfa0b9e6df34c2bdd0fbc1348fca4a0f0149957568d49e40a0d85cb05aeaa152977bcd5e34e9219e3cf4b1a25e1e968888616aadbImmediately isolate the infected system to prevent further spread. Remove the detected threat using Windows Defender or another reputable antivirus, then restore critical data from secure, immutable backups. Conduct a thorough system audit and ensure all operating systems and applications are patched to their latest versions.