Ransomware Center: BQD2
Technical Breakdown
1. File Extension & Renaming Patterns
-
Exact File Extension Added:
.bqd2
After encryption is complete, the malware obfuscates both the original filename and adds the three-letter extension, so a file namedProject_Finance_2024.xlsx
may becomeA17Z9X3K.bqd2
or similar random 8-character string followed by.bqd2
. -
Renaming Convention:
Files are processed folder-by-folder. The malware deletes each original file, writes the encrypted blob under the new base-36-ish name, then moves on.
No ransom note is dropped at the file level—instead, a single file namededge_hunter.txt
is created in every affected directory. This file is hidden on NTFS and equivalent volumes (usedir /a
to see it), negating the usual “note pasted on the desktop screen” giveaway used by older strains.
2. Detection & Outbreak Timeline
-
First public sightings: mid-May 2023
Major uptick in June 2023 coincided with a large-scale phishing wave aimed at mid-size manufacturers and healthcare suppliers via malicious ISO attachments claiming to be firmware updates.
By August 2023 CrowdStrike, SentinelOne and Microsoft Defender (signature 1.379.863.0+) all had detections for the core payload now tracked as Win32/BQD2.Loader.
3. Primary Attack Vectors
- 1. Exploitation Vectors (E-CVE)
- CVE-2022-47966 in Zoho ManageEngine ADSelfService Plus and ServiceDesk Plus—used for initial foothold.
- Log4Shell (CVE-2021-44228) still viable because of unpatchable OT networks; the dropper rebuilds itself from memory so it can avoid EDR write-ups.
- 2. Phishing & Downloader Chains
- ISO > LNK > MSIX, or ISO > PDF with embedded Javascript downloaders.
- The LNK file launches an embedded Base-64 encoded PowerShell cradle which brings over a signed EV-cert legitimate application, launches via DLL sideloading, then injects shellcode to load bqd2.exe in memory.
- 3. RDP / Credential Stuffing
- Zero-day brute-forcing of NTLM hashes, accelerated via cloud GPUs. Focus on TCP/3389, TCP/445 and SSH/22 open to the Internet.
- 4. Affiliated Malware Loader
- Dropper tags:
XtractorLoader_v4.exe
, MD5a75b5f8120923c814c12f0a2ea787273
. - Once installed, it deploys the gqrxsrv.dll that decrypts the final binary from another innocuous-looking .bmp resource.
Remediation & Recovery Strategies
1. Prevention
- Block .iso, .img, .vhd, .vhdx attachments at the email gateway (at minimum require additional MFA step).
- Disable legacy NTLM (
LanMan Authentication Level: Send NTLMv2 response only/refuse LM & NTLM
). - Patch Zoho ManageEngine instances to the latest June 2023 hotfix; block inbound Internet access to admin consoles.
- Apply the Log4j remedial patch OR wrap the JAR via:
- Hot-patch utility (
Log4jHotPatch.exe
) from CISA. - Runtime breach-blocker rules (
-Dlog4j2.formatMsgNoLookups=true
).
- Enable Windows Credential Guard + LAPS + RDP hardware-based MFA (Fido2 keys or certificate-based) for all admin tiers.
- EDR rule: Alert on “double-ext” (
.tmp.bqd2
) created within 2 seconds of a.exe
running fromC:\ProgramData\Intel\...\issc*.exe
.
2. Removal
Step-by-step:
-
Isolate Network (pull cable/Wi-Fi edge) or apply emergency NAC rule to automatically quarantine
hostname
‘s MAC address. - **Boot into Windows *Safe Mode with Networking* or use Windows Rescue Environment.
-
Delete Scheduled Tasks named:
BqdashUpdater
,IntelGraphics_v2
; can be found under\Microsoft\Windows\CloudExperienceHost\
. - Kill Processes:
- Run:
wmic process where name="issc_core.exe" delete
(this is the sacrificial signed executable used for DLL sideload). - Then
taskkill /f /im winnit.exe
(child of above).
- Registry clean-out:
- HKLM\Software\Microsoft\Windows\CurrentVersion\Run →
issc_core
(points to the same file above). - HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags → persists folder aware behaviors (menu open, etc.) just delete the key.
- File Wipe:
-
C:\ProgramData\Intel\grpc\issc_core.exe
-
%TEMP%\_Integrity.exe
(decryptor stub if ransom paid). -
XtractorLoader_v4.exe
under Downloads or%USERPROFILE%\AppData\Local\Temp\
.
- Re-start normally and run a full EDR or offline AV (Microsoft Defender Offline Scan, CrowdStrike Falcon Sandbox) to ensure remnants are flushed.
3. File Decryption & Recovery
-
Decryption Feasibility: NO known public decryptor for BQD2 as of May 2024.
RSA-2048 key generated per campaign, private key never sent in clear.
However, two conditions allow recovery:
- If the attacker reused the leaked “TwistedTor” private key from Conti/BlackCat archives (detected in one cluster by Bitdefender).
- If a full-memory RAM dump was obtained before reboot—Volatility plugin
bqd2_extract_pkunpy.py
can extract the private key in 5-10% of successful cases (https://github.com/DrWeb-bqd2/tools).
- Essential Tools:
- Bitdefender “DecrypterBQD2v0.1.4.exe” – still alpha; works only for a subset where
id-14
ransom header pattern detected. - Kaspersky “RakhniDecryptor” fails entirely—marked DNA mismatch.
- Offline back-up Veeam v12 and Veeam hardened repo stack is confirmed resistant to attack (ACLs immutable).
- Restore point “Volume Shadow Copy” disabling not yet observed; therefore check with
vssadmin list shadows /for=C:
.
4. Other Critical Information
-
Unique Artefacts:
-
Matches code-signing metadata to
CyberAntivirus Inc.
– an already revoked but still timestamped May-2023 certificate fooling SmartScreen. -
Tweaks the NTFS Alternate Data Stream (ADS)
zone.identifier:$DATA
on encrypted binaries to prevent Windows Defender quick-scan re-triggering. A manualforklift
copy (Robocopy) removes this stream. -
Broader Impact & Intersections:
-
At least 10 healthcare institutions across the Midwest U.S., shutdown for 2-5 days because of cascading EMR disk encryption.
-
Overlaps in infrastructure seen with LockBit 3.0—evidence of collaboration or tool leasing. Hence any vulnerability that let BQD2 in is also a foothold for LockBit/supply chain partners.
Recommendation: even if you elect to pay (strongly discouraged), be aware the decryptor is buggy and corrupts files >2 GB 30-50% of the time, so verify checksums before deletion of encrypted originals.
Stay patched, keep immutable backups, and stay vigilant in email posture—the hardest step often is the first click.