Cyber News

How Dark 101 Ransomware Uses .NET Binary to Disable Recovery Mode and Task Manager

Cybersecurity researchers at FortiGuard Labs have disclosed a new ransomware threat identified as Dark 101, delivered as an obfuscated .NET binary.

This advanced malware, now categorized under the Dark 101 malware family, follows a calculated multistage attack sequence that disables system recovery capabilities and encrypts user data before extorting victims for ransom in Bitcoin.

The ransomware is designed to bypass traditional detections, initiating its attack by checking for signs of analysis.

If it detects that the executable is not running from the %Appdata% directory, it delays execution by 10 seconds a simple yet effective sandbox evasion technique.

Once past the environment check, it self-replicates as svchost.exe in %Appdata%, mimicking the legitimate Windows process to appear benign, while its suspicious location red-flags the process for behavioral detection systems like FortiSandbox.

Disabling Recovery Options and Task Manager

A key highlight of the Dark 101 ransomware is its anti-recovery mechanism. It executes a set of destructive system commands designed to make file restoration nearly impossible. These include:

  • vssadmin delete shadows /all /quiet – to eliminate Volume Shadow Copies
  • wmic shadowcopy delete – to further erase shadow copies via Windows Management Instrumentation
  • wbadmin delete catalog –quiet – to delete Windows Backup Catalogs

By executing these commands in succession, the malware ensures users cannot restore their systems using built-in Windows recovery tools.

To enhance its persistence and minimize user intervention, Dark 101 modifies the Windows Registry at:

textHKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr

Setting the DisableTaskMgr Disabling Task Manager to 1 effectively renders it useless, leaving users without a crucial tool to detect or terminate malicious activity.

Targeted Encryption and Ransom Demand

Once system defenses are neutralized, the ransomware scans user-accessible directories for files matching specific extensions associated with image, document, archive, database, and other types of personal data.

Matched files are encrypted and renamed with a random four-character extension. Alongside the encrypted files, a ransom note  read_it.txt is dropped in each affected directory.

Chain of execution of the ransomware

The note demands payment in Bitcoin and typically includes contact information for negotiating decryption.

Fortinet Response and Protection

Fortinet has classified the threat under MSIL/Kryptik.SAC!tr. Ransom confirms that its security solutions, including FortiGate, FortiEDR, and FortiClient, can detect and block the malware.

Organizations are urged to maintain up-to-date AV signatures and review suspicious registry and command-line activity.

MD5 hash of known sample: ae3dd3d1eedb6835e6746d51d9ab21c6.
Fortinet also recommends its free NSE 1 training on information security awareness to help users stay alert against evolving cyber threats.

IOCs

MD5sum:

ae3dd3d1eedb6835e6746d51d9ab21c6 

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago