Monday, May 12, 2025
Homecyber securityRansomHub Ransomware Deploys Malware to Breach Corporate Networks

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

Published on

SIEM as a Service

Follow Us on Google News

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging SocGholish malware, also known as FakeUpdates, was uncovered targeting corporate networks.

This attack, orchestrated by affiliates of RansomHub-a notorious Ransomware-as-a-Service (RaaS) group emerging in 2024-demonstrates a calculated approach to infiltrate high-profile organizations.

SocGholish Malware as Initial Vector

RansomHub markets its illicit services on the Dark Web forum RAMP (Russian Anonymous Market Place), focusing on data exfiltration and extortion.

- Advertisement - Google News

The infection chain began with a compromised WordPress site, “butterflywonderland[.]com,” which tricked users into downloading a malicious file named “Update.zip.”

RansomHub Ransomware
Infection chain

This file contained a JScript script, “Update.js,” which initiated communication with a SocGholish Command and Control (C2) server at “exclusive.nobogoods[.]com” to fetch and execute subsequent payloads via the eval() function.

Technical Depth: Multi-Stage Malware Deployment and Evasion Tactics

The SocGholish script executed a series of reconnaissance steps, harvesting critical system information such as domain, username, computer name, and processor architecture, which was URL-encoded and transmitted to the C2 server via HTTP POST requests.

Utilizing Living Off the Land Binaries (LOLBins) like net.exe and systeminfo, the malware gathered network and system details, while PowerShell commands enumerated servers in Active Directory and extracted browser credentials from Microsoft Edge and Google Chrome, including encryption keys for stored sensitive data.

Within roughly 6.5 minutes of initial contact, a Python-based backdoor was retrieved, renamed to “python3.12.zip,” unpacked, and executed via a scheduled task.

RansomHub Ransomware
Python backdoor main function

This backdoor, identified as “fcrapvim.pyz,” employed advanced obfuscation and evasion techniques, checking for virtual machine environments and debugging processes to avoid detection.

Its decryption process involved multiple stages, including Base85 decoding, AES-256 (GCM), AES-128 (CTR), ChaCha20 encryption, and ZLIB inflation, showcasing a complex layered defense against analysis.

The final stage revealed a connection to a threat actor server at “38.146.28[.]93,” enabling SOCKS proxy functionality for reconnaissance and lateral movement within compromised networks, aligning with findings from Trend Micro’s reports on similar TTPs.

According to eSentire Report, this attack underscores the strategic patience of RansomHub affiliates, who cast a wide net to identify valuable targets post-discovery, bypassing sandbox environments and security researchers.

The deployment of SocGholish as an initial access vector, combined with a Python backdoor for persistent access, highlights a trend of multi-stage payloads designed for stealth and impact.

Organizations must prioritize endpoint detection and response (EDR) solutions to identify anomalous behaviors, such as unexpected scheduled tasks or network traffic to suspicious domains/IPs like those identified in this campaign.

Regular patching of web platforms like WordPress, employee training on phishing and social engineering tactics, and robust credential protection mechanisms are critical to mitigate such threats.

eSentire’s 24/7 Security Operations Centers (SOCs), backed by Elite Threat Hunters and the TRU team, continue to track and respond to such incidents, reinforcing the need for proactive cybersecurity in an era where adversaries operate beyond conventional schedules.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...