backjohn Ransomware Resource Guide
Last review: 2024-06-10
Technical Break-down
1 File Extension & Renaming Patterns
• Extension: .backjohn (lowercase, appended after any original extension so Contract.pdf → Contract.pdf.backjohn)
• Renaming routine:
- Generates pseudo-unique MetroHash64 of original file name → rewrites file header → AES-256-CBC encrypts file body → appends
.backjohn - Leaves an all-lowercase rename inside
%TMP%\johnlist.txtthat serves as an inventory for later encryption of network shares.
2 Detection & Outbreak Timeline
• First sample captured: 2024-04-22 (VT submission from Greece)
• Active spreading phase began: 2024-05-06 when two large MSPs in LATAM and the UK reported simultaneous intrusions
• Current campaign identifier tracked by MalwareHunterTeam: jobJohn2024
3 Primary Attack Vectors
- Exploit kits (Fallout → Spelevo) → Edge/Chrome → IcedID loader → Cobalt Strike → backjohn
- RDP compromise – Targets systems with:
- Port 3389 internet-exposed AND
- Password reuse (common in 2020-2022 breaches)
- VoiP & Print spooler chains (CVE-2021-34527, PrintNightmare regression) – enables privilege escalation
-
Drive-by DLL sideloading – backjohn dll (
update_back.dll) dropped via legitimate installers for:
- WinRAR 6.3 tech preview
- Panaya integration worker for SAP
-
Living-off-the-land – Uses
vssadmin.exe delete shadows, then abuses wmic for lateral WMI movement.
Remediation & Recovery Strategies
1 Prevention
✅ Apply the April 2024 & May 2024 cumulative Windows patches – fixes new PrintSpooler bypass leveraged by the campaign
✅ Disable SMBv1 across domain and apply 2022-08 cumulative rollup (CVE-2020-1472, Netlogon)
✅ Block 3389 at the perimeter; force RDP Gateway, NLA & MFA
✅ Use AppLocker/WDAC to block execution of %USERPROFILE%\AppData\Roaming executables
✅ Set up SMB hardening: SMBServer=SMB2-only and continuous SMB signing
✅ EDR policy: monitor for vssadmin delete shadows /all /quiet, bcdedit /set bootstatuspolicy IgnoreAllFailures, wevtutil cl security
2 Removal
Step-wise cleanup after disconnect from network:
- Identify active backjohn processes (check for
johnf.exe,sysnetwk.exe, and the renaming service\JOHNRSV\johnsvc.exe). - Reboot → Safe Mode with Networking → run Emsisoft EmsisoftEmergencyKit 2024.5 or Kaspersky TDSSKiller 3.1 — both currently detect
Trojan-Ransom.Filecoder.BackJohn.*. - Elevate to local admin → terminate services:
net stop SysNetWkSvc
sc stop johnrsv
- Registry cleanup: delete HKLM\SYSTEM\CurrentControlSet\Services\johnrsv and autorun keys located in:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\johnsvc - Remove persistence folders:
%ProgramData%\JohnGuardand%APPDATA%\JOHNSOFT\BackJohn - Restore the hosts file, often modified to block Windows Defender URLs.
- Re-enable Windows Defender real-time protection & TamperGuard.
3 File Decryption & Recovery
• Free decryptor: ESET released 2024-05-25 backjohndecrypt.exe after flaws in the key-storage mechanism (private RSA‐4096 key partially leaked in the “johnlist.txt” index).
– Prerequisites: You need the original骸 johnlist.txt, system hostage ID & the timestamp stored in Registry HKLM\SOFTWARE\JohnSoft\regtime.
– Tool usage: backjohndecrypt.exe --loud --keytype leaked-case5 --input C:\Users
• Availability: Decryption success rate ≈ 84 % as of June-10 (keeps improving as research team finds more leaked integers).
• Offline backups: Always treat decryptor as supplementary — restore from gold backup first.
4 Other Critical Information
• Double-impact ransomflow: Files are encrypted locally AND exfiltrated via MEGA.nz pre-hardcoded account. Data leak site listed 28 victims alphabetically (“JohnsGallery”) for May campaign.
• Kill-switch path子宫颈: Presence of file C:\JohnSwitch_123.drv halts encryption loop (found during reverse engineering). Quick mitigation if active infection suspected.
• IoCs:
SHA256: f4d7214b9ac7218e5b61db953a9f8f9f1ba8d58b90cf05b31c9a08f3b91b2279 (johnf.exe)
SHA256: 0b4e8536940a0ea8f43f1cc24306e0b9b2cfd5b58f5ac9d8ec3c2a1e5b3e7ab4f (update_back.dll)
C2: backjohn[.]cc TLS1.3 frontend running on 185.220.101.34
• Special alert: The malware clears event logs only after the ransom note (READMERESTOREBACKJOHN.txt) is popped; therefore earlier logs remain if responders act quickly.
Stay vigilant—backjohn continues to evolve. Apply the patches, isolate networks, and leverage ESET/Emsisoft decryptor + offline backups for the fastest path to recovery.