ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Bart

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Bart

NamesBart
CategoryMalware
TypeRansomware
Description(Proofpoint) Bart ransomware appeared for exactly one day on June 24, 2016. It was a secondary payload downloaded by RockLoader, the initial payload in a large email campaign using zipped JavaScript attachments. The Bart ransom screen was visually similar to Locky’s but Bart had one important distinction: it could encrypt files without contacting a command and control server. However, we have not seen Bart since, suggesting that this was either an experiment or that the ransomware did not function as expected for TA505.
Information<https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta505-dridex-globeimposter>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.bart>
Playbook<https://labs.bitdefender.com/2017/04/bart-ransomware-decryption-tool-released-works-for-all-known-samples/>
<https://www.nomoreransom.org/uploads/Avast_how-to-guide.pdf>

Last change to this tool card: 25 April 2021

Download this tool card in JSON format

All groups using tool Bart

ChangedNameCountryObserved

APT groups

 TA505, Graceful Spider, Gold EvergreenRussia2006-Nov 2022X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]