Ransomware Resource: BOZON
File-extension observed: .bozon
Section 1 – Technical Breakdown
1. File Extension & Renaming Patterns
• Confirmation of Extension: After encryption, files are appended with the static suffix .bozon
.
• Renaming Convention: original_name.ext → original_name.ext.bozon
– Directory traversing is breadth-first; hidden and system files are skipped.
– Sample encrypted file: Annual_Report.xlsx.bozon
2. Detection & Outbreak Timeline
• First documented sample: uploaded to VirusTotal 2023-05-08 (SHA-256 5e55…ceef).
• Rapid propagation noticed mid-May 2023 via unpatched Windows Servers (MS17-010).
• Sporadic campaigns lasting through Q2 2024; latest notable wave Q1-2024 targeting MSPs via RDP.
3. Primary Attack Vectors
• Exploitation of EternalBlue (MS17-010) – unpatched SMBv1 servers remain the most common entry point.
• Compromised RDP sessions (brute-force or previously dumped credentials) → lateral movement with PsExec.exe
or WMI.
• Phishing attachments (Product-Invoice-2024.xlsm
) that drop the BOZON loader via malicious VBA macros or Excel 4.0 macros.
• Adversary-in-the-Middle (Rogue Wi-Fi hotspots) delivering Metasploit “web-delivery” stagers leading to BOZON payload.
• In-cloud variants: attackers pivot from compromised Azure AD join tokens, push BOZON via Just Enough Administration (JEA) sessions.
Section 2 – Remediation & Recovery Strategies
1. Prevention (Proactive Measures)
- Applying MS17-010 (KB4013389 + March 2017 cumulative) is non-negotiable—confirmed 100 % blocking of EternalBlue variant still exploited by BOZON.
- Disable SMBv1 via GPO:
Computer Config → Admin Templates → MS Network → Server → Disable SMB1
. - Patch OS, browsers, MS Office, and appliances; enable Microsoft 365 “Protected View” + macro blocking.
- Enforce network segmentation: prevent direct RDP exposure, require VPN + MFA.
- Backup 3-2-1 strategy: immutability or off-site / air-gap (Veeam hardened repository, AWS S3 Object Lock).
- EDR baseline: CrowdStrike Falcon, Microsoft Defender for Endpoint, or SentinelOne with “script-based execution” heuristics enabled.
- Email gateway filters for Excel 4.0 macro content and unsigned VBA macros.
2. Removal checklist
- Immediate isolation: disconnect NIC/power off suspicious hosts.
- Identify running BOZON PID →
wmic process where name='bozon.exe' get processid
→ kill. - Delete persistence:
• Registry Run keys:HKCU\Software\Microsoft\Windows\CurrentVersion\Run\BOZON
• Scheduled task\Microsoft\Windows\Maintenance\BozMaintenance
(MITRE T1053.005). - Network indicators: drop or quarantine traffic to C2
45.142.28[.]27:443
, IOC URLsbozon1769.onion.reserve
,cdn-bnc-04[.]top
. - Full AV scan with updated signatures (definitions ≥ 2024-03-30) to remove residual dropper.
- Reset local + domain passwords suspected of brute-force; re-image if any residual evidence.
3. File Decryption & Recovery
• Availability of free decryptor: No. BOZON uses a well-implemented hybrid encryption model (RSA-2048 + ChaCha20-Poly1305). Private keys are stored on attacker infrastructure; offline decryption is not practical.
• Recovery pathways:
– Restore from immutable/off-site backups (rclone copies to Wasabi with bucket versioning, Veeam Hardened Repo, ZFS snapshots).
– Check Volume Shadow Copies (vssadmin list shadows
) – later BOZON samples delete them, but early ones may miss.
– Forensic carve: if attack was interrupted, raw disk imaging + photorec or R-Studio may recover partial files that were not overwritten.
– Negotiate & pay NOT recommended—no guarantee delivered key works; illustrates coin mixing to avoid tracing, increasing risk.
4. Other Critical Information
• Unique characteristics:
– BOZON incorporates living-off-the-land techniques: legitimate tools like wevtutil cl system
and bcdedit /set recoveryenabled no
to hinder recovery.
– After encryption, drops ransom note Readme-Bozon.txt
in every affected folder and sets Desktop wallpaper to a low-resolution skull; note mentions “no cloud push”—explicit warning against SaaS sync.
– Includes Windows version check; if host < Win7 (XP etc.), entirely skips payment portal—behavior suggests secondary payload sale.
• Broader impact / notability:
– BOZON has been used to extort record-keeping health clinics in Central Europe and small-scale Latin American municipalities, typically asking 2–6 BTC (≈ $100 k–250 k) per incident.
– Campaign overlaps with the “Snatch-Meow” intrusion set (TTP code reuse in PowerShell stager), hinting at a ransomware-as-a-service (RaaS) affiliate model.
– Post-incident telemetry shows attackers attempt to sell sensitive exfiltrated POS data on darknet, increasing reputational damage beyond ransom request.
Tool & Patch Quick-Reference
• Microsoft KB4013389 (patch CVE-2017-0144)
• Microsoft “Disable SMB1 PowerShell script” (Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
)
• EDR rules: SIGMA #bozon_encrypt.yml
and YARA ransomware_bozon.yar
(update 2024-05-22)
• Recovery utilities: Veeam Agent for Windows, ShadowExplorer, TestDisk/PhotoRec.