Names | Bart | |
Category | Malware | |
Type | Ransomware | |
Description | (Proofpoint) Bart ransomware appeared for exactly one day on June 24, 2016. It was a secondary payload downloaded by RockLoader, the initial payload in a large email campaign using zipped JavaScript attachments. The Bart ransom screen was visually similar to Locky’s but Bart had one important distinction: it could encrypt files without contacting a command and control server. However, we have not seen Bart since, suggesting that this was either an experiment or that the ransomware did not function as expected for TA505. | |
Information | <https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta505-dridex-globeimposter> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.bart> | |
Playbook | <https://labs.bitdefender.com/2017/04/bart-ransomware-decryption-tool-released-works-for-all-known-samples/> <https://www.nomoreransom.org/uploads/Avast_how-to-guide.pdf> |
Last change to this tool card: 25 April 2021
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
TA505, Graceful Spider, Gold Evergreen | 2006-Nov 2022 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |