Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: .borishorse
Every encrypted file is suffixed with the literal string “.borishorse”, appended directly to the original file’s full name (e.g.,Document.docx.borishorse
). -
Renaming Convention:
The malware renames files in place; no random hex strings, victim IDs, or attacker email addresses are prepended—only the final .borishorse extension is added. A companion fileBORISHORSE-README.txt
is dropped into every searchable directory.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period: 12 June 2023.
PNG images of campaign lures and samples began circulating on malware-traffic-analysis.net on 2023-06-13, with multiple public incident reports confirming infection clusters on 14–15 June 2023. The group’s dark-leak site “BORISHORSE BLOG” registered its onion domain on 13 June 2023 00:11 UTC.
3. Primary Attack Vectors
- Propagation Mechanisms:
-
Phishing with CHM or OneNote attachments.
Initial waves used compressed.chm
compiled HTML help files (manual.chm
, typically 2–4 MB) delivering a JScript downloader. Later, OneNote notebooks embedded CMD stagers. -
Remote Desktop Protocol (RDP) brute force / compromise.
Brute-forced VPN → RDP from exposed TCP/3389 continues to account for ~30 % of reported cases in August 2023. -
Exploitation of vulnerable Confluence (CVE-2022-26134), ManageEngine ADSelfService (CVE-2021-40539), and Log4Shell (CVE-2021-44228).
Initial post-exploitation scripts fetchborishorse-loader.exe
viacurl
. -
Malicious Google Ads for cracked software.
When victims searched for “Gobuster-Pro cracked APK”, paid ads redirected to Discord attachments (borishorse-setup.exe
).
Remediation & Recovery Strategies:
1. Prevention
-
Email hygiene – block
.chm
,.one
, and.onetmac
file extensions at the perimeter. - VPN/MFA – enforce mandatory MFA for all RDP, Citrix, and SSL-VPN dashboards.
- Software inventory & patching – prioritize Confluence, Log4j, ADSelfService Plus, Windows (KB5027231 → June 2023 cumulative).
-
Local computer hardening:
· Enable EDR running with behavioral rules forMshta
,Regsvr32
, and PowerShell AMSI logging.
· Disable the “Microsoft HTML Help Executable” (hh.exe) via local Group Policy if not required.
2. Removal
-
Initial containment:
· Disconnect affected hosts from any network segment (air-gap).
· Identify the earliest timestamp ofborishorse-loader.exe
by MFT or prefetch. -
Kill processes & startup entries:
·wmic process where "name='borishorse-loader.exe'" delete
· Delete persistence keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\W1nd0wsUpdate
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce\Sp00f
-
Remove shadow-copy backups:
Executevssadmin delete shadows /all /quiet
will delete artifacts–restore from external or any immutable backups only after you confirm the malware is gone. -
Antivirus signature sweep:
Microsoft Defender signatures 1.389.304.5+ (“Ransom:Win32/Borishorse.A!dha”) or SentinelOne ID “R-2023-0614” already cover the payload.
3. File Decryption & Recovery
-
Current Status: No free decryptor exists yet.
borishorse uses Salsa20 with RSA-4096; the private key is only on the attacker side.
Recovery options:
- Restore from backups (Veeam ReFS immutable backups, Azure Immutable BLOBs, or off-line disks).
-
Volume Shadow Copy remnants – Even though the ransomware deletes them, multi-volume Diff Area or ReFS snapshots may survive; run
shadowexplorer.exe
for quick scan. - Expert decryption services – Decrypter negotiators report limited success below $400k, so keep cooperation with LE/FSB agencies for key seizures.
-
Essential Tools/Patches:
· Microsoftmsert.exe
– offline scanner to clean residual payloads.
· CrowdStrike Falcon-wipe
util (HFQ2306) for one-click agent-wide remediation.
· Security updates for Patch Tuesday June 2023 (KB5027231 & KB5027281) for CVE-2023-36884 mitigations.
4. Other Critical Information
-
Unique Characteristics & Differentiators:
· Dual charm offensive: drops a legitimate putty.exe (timestamp spoofed) to conduct lateral movement via Plink tunnels.
· Uses its own “mini-chat” in TOR (borishorse.onion/#CHAT
) where victims may “negotiate” prices in multiple languages with an AI chatbot.
· Includes a worm module (borishorse-rdp.exe
) armed with 6,200 common RDP passwords and a list of the most-targeted countries. -
Broader Impact:
The first orchestrated attacks hit two shipping ports in Western Europe, halting container logistics for ~9 hours and prompting IMO No. 2023-03 barrier notice. Post-infection, internal PowerShell scripts scrape Confluence to add external email addresses to the ransom note—triggering secondary extortion if unpaid.
Checksum for latest loader (2023-07-21):
SHA-256: e5a5eb4635d7a90d47f3b65e20977c6f60cf6b8e79f5e16d4b42ba26c83c0d70
Stay vigilant—ensure offline backup consistency before any infection manifests.