Saturday, May 24, 2025
HomeCyber AttackDOGE Big Balls Ransomware Leverages Open-Source Tools and Custom Scripts for Multi-Stage...

DOGE Big Balls Ransomware Leverages Open-Source Tools and Custom Scripts for Multi-Stage Attacks

Published on

SIEM as a Service

Follow Us on Google News

A recent discovery by Netskope Threat Labs has brought to light a highly complex ransomware variant dubbed “DOGE Big Balls,” a derivative of the Fog ransomware.

Named provocatively after the Department of Government Efficiency (DOGE), this ransomware incorporates political statements and taunts in its payloads, including references to public figures and YouTube videos.

The ransomware’s arsenal comprises an intricate multi-stage infection chain that utilizes a blend of custom PowerShell scripts, open-source tools like Mimikatz and Rubeus, vulnerable driver exploits, and red team frameworks such as Havoc.

- Advertisement - Google News
DOGE Big Balls Ransomware
 CustomAction table.

The frequent updates to its payloads, hosted on platforms like Netlify, underscore the adaptability and persistence of the threat actors behind this campaign.

Unveiling a Sophisticated Ransomware Variant

The infection process begins with an MSI file, payload.msi, which likely spreads through phishing emails or exploitation of vulnerable services, as suggested by historical reports from Trend Micro and Cyble.

Upon execution, the MSI triggers a PowerShell script, wix.ps1, encoded with base64 and XOR encryption, to check for administrative privileges and establish persistence via an LNK file named “EdgeAutoUpdater.lnk” in the Windows Startup folder and a scheduled task, “EdgeAutoUpdaterTask.”

DOGE Big Balls Ransomware
LNK files

This leads to the download and execution of stage1.ps1 from a central URL, which creates a hidden directory in the Startup folder, disables Windows Defender, and sets additional persistence through registry Run keys.

Stage1.ps1 further downloads a series of payloads, including cwiper.exe, ktool.exe, and several shell scripts, evolving over time to include the DOGE Big Balls ransomware binary itself, alongside Havoc Demon payloads exploiting vulnerabilities like CVE-2015-2291 in the iQVW64.sys driver.

The Multi-Stage Infection Chain

Subsequent scripts such as amsibypass.ps1 target Windows Antimalware Scan Interface (AMSI) by patching the AmsiScanBuffer function to evade detection, while pivot.ps1 facilitates lateral movement via Invoke-Mimikatz.ps1 for credential dumping and Invoke-SMBExec.ps1 for SMB-based propagation.

The scripts gather extensive reconnaissance data, including public IP, open ports, and password hashes for Pass-The-Hash attacks, disseminating stage1.ps1 across Active Directory (AD) environments.

Additional scripts like dcstage1.ps1 and rubeuspivot.ps1 focus on Domain Controllers, employing Rubeus for Pass-The-Ticket attacks and creating backdoor accounts like “svcadmin” for sustained access.

Tools like ZeroTier, installed via ztinstall.ps1, and potential Cobalt Strike beacons through webdelivery.ps1, enhance remote access capabilities for the attackers.

Moreover, scripts like xmrigstart.ps1 deploy cryptocurrency miners, adding a financial motive to the destructive intent of the ransomware.

The continuous evolution of payloads, with new additions like addadmins.ps1 for administrator account creation and shwatchdog.ps1 for process monitoring, illustrates the dynamic and relentless nature of this threat.

According to the Report, Netskope’s detection signatures, including Generic.ShellCode.Marte.2.F02D5747 and Script-PowerShell.Trojan.Powdow, aim to counter these attacks, yet the complexity and rapid updates pose significant challenges.

The DOGE Big Balls ransomware exemplifies the growing sophistication of cyber threats, merging technical prowess with psychological provocation, necessitating robust defense mechanisms and vigilant monitoring to mitigate its impact on targeted environments.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...