Saturday, April 5, 2025
HomeCVE/vulnerabilityRansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus

Published on

SIEM as a Service

Follow Us on Google News

The RansomHub ransomware group tracked as Water Bakunawa, employs targeted spear-phishing to exploit the Zerologon vulnerability, allowing them to gain unauthorized access to networks, affecting various industries and critical infrastructure sectors, demanding ransom payments for data release. 

The group’s recent integration of EDRKillShifter, a tool designed to evade detection and disrupt security processes, poses a significant threat to endpoint security, whose ability to dynamically disable EDR solutions and ensure persistence makes it a formidable adversary for traditional security measures.

The infection chain of the RansomHub utilizing EDRKillShifter
The infection chain of the RansomHub utilizing EDRKillShifter

A ransomware group typically gains initial access to systems by exploiting vulnerabilities, phishing, or password spraying. A compromised user account was the primary entry point in a specific incident, with multiple spear phishing attempts detected. 

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

The Zerologon vulnerability was identified as a potential access vector, as the Vision One telemetry dataset revealed detections indicating the abuse of elevation control mechanisms, further suggesting the presence of malicious activity.

232.bat performing brute force
232.bat performing brute force

RansomHub’s evasion tactics employed four batch scripts to disable security measures and facilitate unauthorized access, as 232.bat used password spraying and disabled Windows Defender. 

Tdsskiller.bat modified the registry, terminated processes, and disabled Trend Micro’s antivirus service, and Killdeff.bat, an obfuscated PowerShell script, manipulated Windows Defender settings and attempted privilege escalation. 

LogDel.bat altered file attributes, modified RDP settings, and cleared Windows Event Logs to hinder forensic analysis, which compromised system security and enabled RansomHub to execute its malicious payload.

The command used to remove system and hidden attributes of Default.rdp via Attrib.exe
The command used to remove system and hidden attributes of Default.rdp via Attrib.exe

The EDRKillShifter tool, a BYOVD loader, uses a password-protected command line to execute and decrypt an embedded resource named “data.bin,” and then unpacks and executes a second-stage payload, which further decrypts the final payload containing the Gobinary and a vulnerable driver. 

The loader deploys and exploits the vulnerable driver to gain elevated privileges. This allows it to terminate specific antivirus applications listed in an IoC text file by creating a Windows service named KB20240815 to persist on the system.

EDRKillShifter dropping the vulnerable driver
EDRKillShifter dropping the vulnerable driver

RansomHub employed a multi-stage attack, starting with credential theft using Taskmgr.exe to dump LSASS memory and then conducting covert network reconnaissance with NetScan, laterally moving using SMB/Windows Admin Shares. 

AnyDesk served as their C&C infrastructure, while rclone was used to exfiltrate sensitive files, which leveraged various techniques to gain deep access, steal data, and disrupt operations.

 RansomHub installing AnyDesk.exe
 RansomHub installing AnyDesk.exe

A sophisticated ransomware leverages EDRKillShifter to evade security defenses and deploys a binary that encrypts files and deletes VSS snapshots.

It uses a unique file extension based on the ransom note’s filename to identify encrypted files. 

To counter this threat, organizations should strengthen endpoint protection, implement driver- and kernel-level protections, enforce credential security, enable behavioral monitoring, harden endpoint configurations, and stay updated with the latest threat intelligence.

Analyse AnySuspicious Links Using ANY.RUN's New Safe Browsing Tool: Try It for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...