
| Names | Bart | |
| Category | Malware | |
| Type | Ransomware | |
| Description | (Proofpoint) Bart ransomware appeared for exactly one day on June 24, 2016. It was a secondary payload downloaded by RockLoader, the initial payload in a large email campaign using zipped JavaScript attachments. The Bart ransom screen was visually similar to Locky’s but Bart had one important distinction: it could encrypt files without contacting a command and control server. However, we have not seen Bart since, suggesting that this was either an experiment or that the ransomware did not function as expected for TA505. | |
| Information | <https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta505-dridex-globeimposter> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.bart> | |
| Playbook | <https://labs.bitdefender.com/2017/04/bart-ransomware-decryption-tool-released-works-for-all-known-samples/> <https://www.nomoreransom.org/uploads/Avast_how-to-guide.pdf> | |
Last change to this tool card: 25 April 2021
Download this tool card in JSON format
| Changed | Name | Country | Observed | ||
APT groups | |||||
| TA505, Graceful Spider, Gold Evergreen | 2006-Nov 2022 | ![]() | |||
1 group listed (1 APT, 0 other, 0 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||