Wednesday, May 14, 2025
Homecyber securityNew Contacto Ransomware Evades AV Detection & Uses Windows Console for Execution

New Contacto Ransomware Evades AV Detection & Uses Windows Console for Execution

Published on

SIEM as a Service

Follow Us on Google News

In early January 2025, a new ransomware strain identified as Contacto surfaced, showcasing advanced techniques designed to bypass conventional security measures.

This analysis provides insights into its operational mechanisms, particularly suited for professionals venturing into ransomware analysis.

Operational Mechanisms

Upon execution, Contacto ransomware employs the GetConsoleWindow() and ShowWindow() functions to retrieve and conceal its command prompt, ensuring stealth during execution.

- Advertisement - Google News

It establishes a mutex named ContactoMutex to prevent multiple instances of itself from running simultaneously.

To maximize its control over the infected system, Contacto escalates privileges.

It iterates through a predefined list of security privileges such as SeDebugPrivilege and SeTakeOwnershipPrivilege and utilizes the SetPrivileges() function to enable these rights via the AdjustTokenPrivileges API.

This escalation allows the ransomware to manipulate system files and settings effectively.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Encryption Process

Contacto employs an innovative threading model that enhances the efficiency of file encryption.

Ransomware Evades AV Detection
Threading Model Used In Ransomware

By determining the number of available processors, the system creates double the number of threads, which facilitates a streamlined workflow.

Each thread is tasked with executing a worker function dedicated to file access.

This design ensures sequential access and modification rights through meticulous error handling, thereby minimizing the risk of disruptions and optimizing resource utilization.

The encryption process begins with dynamic key generation, where Contacto produces two cryptographic keys: a primary key (32 bytes) and a secondary key (8 bytes).

These keys are generated using a hybrid random number generator, ensuring a strong foundation of randomness.

To further bolster security, the keys undergo hashing through iterative SHA-256 rounds, which guarantees that each file is encrypted with a unique key combination.

According to the research, this approach significantly enhances the security of the encryption process, making it resilient against potential decryption attempts.

In addition to its threading and key generation strategies, Contacto utilizes a chunk-based encryption method.

Rather than encrypting entire files, the system focuses on specific segments, such as headers and footers, utilizing adaptive chunk sizes tailored to the performance capabilities of the system and the size of the files.

This targeted approach not only speeds up the encryption process but also helps maintain a degree of file integrity, rendering recovery efforts more complex and challenging for unauthorized users.

By optimizing performance while safeguarding the content, Contacto effectively balances security and efficiency in its encryption procedures.

The ransomware’s final acts include modifying system configurations, such as disabling Windows Defender through registry manipulation and deleting backup copies to hinder recovery attempts.

Ransomware Evades AV Detection
Ransom Note

Additionally, it implements a visual alteration of the victim’s desktop by changing the wallpaper to display a ransom note.

The Contacto ransomware represents a sophisticated threat, employing advanced techniques for system infiltration, data encryption, and stealth operations, making it a critical subject for ongoing cybersecurity vigilance and analysis.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance

Penetration testing is still essential for upholding strong security procedures in a time when...

Swan Vector APT Targets Organizations with Malicious LNK and DLL Implants

A newly identified advanced persistent threat (APT) campaign, dubbed "Swan Vector" by Seqrite Labs,...