Post

Threat Intelligence 01: The Gentlemen Ransomware

Technical threat intelligence report on The Gentlemen Ransomware, a fast-moving RaaS operation using double extortion, broad targeting, and adaptive evasion tradecraft.

Threat Intelligence 01: The Gentlemen Ransomware

Executive Summary

The Gentlemen is a fast-moving, high-impact ransomware operation that emerged in July–August 2025 and rapidly evolved into a global threat. The group operates under a Ransomware-as-a-Service (RaaS) model, providing affiliates with a customizable, cross-platform toolkit designed for enterprise intrusions.

Since initial observation, The Gentlemen has targeted medium-to-large organizations across 17+ countries, exerting particular pressure on the manufacturing, construction, healthcare, and insurance sectors. Operations rely on double extortion tactics, aggressive defense evasion, and modern cryptography (ChaCha20 + RSA-4096) to maximize disruption and negotiation leverage.

Twitter account Twitter account


Threat Actor Profile

AttributeDetail
Actor NameThe Gentlemen
First ObservedJuly–August 2025
Operation TypeRansomware-as-a-Service (RaaS)
Extortion MethodDouble Extortion
EncryptionChaCha20 + RSA-4096
File Extension.7mzhh
Ransom NoteREADME-GENTLEMEN.txt
Countries Targeted17+

Attack Chain Overview

The Gentlemen follows a structured intrusion lifecycle — from initial access through to data exfiltration and ransomware deployment. The phases below map the full attack chain as observed across confirmed incidents.

The Ransomware Attack Chain Trend Micro - The Ransomware Attack Chain


Phase 1 — Initial Access

Techniques: T1190 · T1078 · T1078.002

The group gains entry through two primary vectors:

  • Exploitation of internet-facing services (e.g., VPN appliances, public-facing applications)
  • Abuse of compromised FortiGate administrative accounts

C2 & Contact Reference

ChannelValue
Emailnegotiation_hapvida@proton.me
TOX IDID88984846080D639C9A4EC394E53BA616D550B2B3AD691942EA2CCD33AA5B9340FD1A8FF40E9A
TOX Downloadhttps://tox.chat/download.html
Leak Site (Tor)http://.onion/
Tor Browserhttps://www.torproject.org/download/

The leak website The Ransomware Leak Website


Phase 2 — Reconnaissance & Discovery

Techniques: T1046 · T1087 · T1087.002 · T1482

Network scanning is performed using Advanced IP Scanner and Nmap. Operators enumerate local drives and Windows Failover Cluster Shared Volumes (CSV) to identify encryption targets.

Enable Network Discovery

1
Get-NetFirewallRule -DisplayGroup "Network Discovery" | Enable-NetFirewallRule

Volume Enumeration

1
2
3
4
5
6
7
8
9
$volumes = @()
$volumes += Get-WmiObject -Class Win32_Volume |
    Where-Object { $_.Name -like '*:\*' } |
    Select-Object -ExpandProperty Name
try {
    $volumes += Get-ClusterSharedVolume |
        ForEach-Object { $_.SharedVolumeInfo.FriendlyVolumeName }
} catch {}
$volumes

System Banner (Observed in Sample)

1
2
Write-Host "Windows version <version>" -BackgroundColor Blue -ForegroundColor White
Write-Host "The Gentlemen" -BackgroundColor DarkGray -ForegroundColor White -NoNewline

Phase 3 — Privilege Escalation

Techniques: T1068

Components are executed with elevated privileges to gain full environment control.

FlagDescription
/RU SYSTEMschtasks flag — run task as SYSTEM account
--systemRansomware flag — encrypt as SYSTEM user
Win32_ProcessWMI class used for elevated process creation

WMI Elevated Process Creation

1
2
$p = [WMICLASS]"\\<target-host>\root\cimv2:Win32_Process"
$p.Create("<command>")

Phase 4 — Defense Evasion

Techniques: T1562 · T1112 · T1027 · T1484.001

Observed evasion techniques include:

  • Deployment of kernel-level anti-AV utilities
  • Configuration of AV/Defender exclusion paths
  • Neutralization of EDR tools
  • Disabling Microsoft Defender real-time protection

Disable & Exclude (Local)

1
2
3
4
powershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true;
Add-MpPreference -ExclusionPath 'C:\';
Add-MpPreference -ExclusionPath 'C:\Temp';
Add-MpPreference -ExclusionPath '\\<share$>';"

Forced Override

1
Set-MpPreference -DisableRealtimeMonitoring $true -Force

Remote Cross-System Execution

1
2
3
4
5
Invoke-Command -ComputerName <target-host> -ScriptBlock {
    Set-MpPreference -DisableRealtimeMonitoring $true;
    Add-MpPreference -ExclusionPath 'C:\';
    Add-MpPreference -ExclusionProcess '<process-name>'
}

Log & Artifact Clearing

TargetCommand
Defender Support Logsdel /f /q C:\ProgramData\Microsoft\Windows Defender\Support\*.*
RDP Log Filesdel /f /q %SystemRoot%\System32\LogFiles\RDP*\*.*
Windows Prefetchdel /f /q C:\Windows\Prefetch\*.*

Phase 5 — Lateral Movement & Remote Execution

Techniques: T1021 · T1021.001 · T1021.002 · T1021.004

Legitimate administration tools are leveraged for payload transfer and execution across systems, including PsExec, PowerRun, and PuTTY.

Remote Execution via WMI

1
2
$p = [WMICLASS]"\\<target-host>\root\cimv2:Win32_Process"
$p.Create("<command>")

Remote Execution via Invoke-Command

1
2
3
Invoke-Command -ComputerName <target-host> -ScriptBlock {
    Start-Process "<binary-path>"
}

Phase 6 — Persistence & Propagation

Techniques: T1547 · T1136

Group Policy Object (GPO) manipulation is used for domain-wide payload distribution.

NETLOGON Share Abuse

This technique enables operators to distribute malicious payloads via the NETLOGON share, enabling near-simultaneous infection across domain-joined machines.

ReferenceDescription
\\share$UNC path used for payload staging
--sharesRansomware flag — encrypt UNC/network shares
NETLOGONReferenced in LanmanServer context — domain-wide deployment
autorun.ini / autorun.infPotential persistence-related artifacts

Phase 7 — Data Collection & Exfiltration

Techniques: T1074 · T1074.001 · T1039 · T1048 · T1048.001

Sensitive data is staged prior to exfiltration. Exfiltration is conducted over encrypted SFTP using WinSCP.

1
2
3
4
5
$volumes += Get-WmiObject -Class Win32_Volume |
    Where-Object { $_.Name -like '*:\*' } |
    Select-Object -ExpandProperty Name
$volumes += Get-ClusterSharedVolume |
    ForEach-Object { $_.SharedVolumeInfo.FriendlyVolumeName }

Phase 8 — Ransomware Deployment & Impact

Techniques: T1486 · T1489 · T1552

  • Ransomware deployed via NETLOGON share using domain admin credentials
  • Files encrypted with .7mzhh extension
  • Ransom note dropped as README-GENTLEMEN.txt
  • Backup, database, and security services terminated: Veeam, SQL, Oracle, SAP, Acronis
  • Deletion of shadow copies, event logs, prefetch, and other forensic artifacts

The ransomware note The Ransomware Note


Phase 9 — Victimology

Target Sectors

Manufacturing · Construction · Healthcare · Insurance · Other

Target Regions

Asia-Pacific · South America · North America · Middle East · Other

Victims span 17+ countries with no single geographic concentration, indicating opportunistic targeting with broad sector reach.

Victim Distribution Trend Micro - Victim distribution by industry, region, and country


Technical Analysis

Execution Arguments

Ransomware performs a command-line argument parsing. These arguments are used to provide detailed control over encryption targets, performance options, and operation modes.

ArgumentDescription
--password PASSRequired to execute ransomware
--path DIRSEnumerate directories and disks to encrypt
--T MINDelay before encryption
--silentDo not rename files after encryption
--systemEncrypt local drive only
--sharesEncrypt mapped network and available UNC shares only
--fullEncrypt both --system and --shares
--fastEncrypt 9%
--superfastEncrypt 3%
--ultrafastEncrypt 1%

Execution Arguments Ransomware executable arguments --password is required. If the value is missing or incorrect, the ransomware immediately terminates. This helps ensure execution only in attacker-intended environments and reduces detonation in sandbox analysis environments. —

Encryption Algorithm

Services Terminated Before Encryption

Commonly terminated services include: sql, vss, VSS, VSNAP, QBDBMgrN, pgAdmin3, pgAdmin4, Veeam, MSSQLServer, WSBExchange, GxVss, SAP, MySQL, MariaDB, PostgreSQL, TeamViewer, BackupExecAgent, BackupExecRPCService, BackupExecManagementService, BackupExecJobEngine, VeeamTransportSvc, OracleServiceORCL, MSExchange, SAPService, postmaster, CagService, DefWatch, SccEvtMgr, GxClMgr, CVMountd.

File Extension Exclusion List

Skipped during encryption: .exe, .bat, .drv, .tmp, .msp, .prf, .ms, .ci, .co, .key, .ocx, .pdb, .wp, .xhl, .pro, .mod, .dll, .ps1, .ic, .sh, .tab, .in, .cmd, .ani, .386, .cur, .idx, .sys, .com, .sh, .sm, .pas, .pl, .cp, .lad, .vic, .ms, .su, .sql, .SAP, .cvd, .vss, .Sql, .Dir.

Crypto Engine

  • The ransomware contains an embedded attacker public key (decoded in memory).
  • For each file, it generates a fresh random 32-byte value and uses X25519 (ECDH) with the attacker public key to create a shared secret.
  • That shared secret is processed with HChaCha20 to derive a 32-byte subkey.
  • The subkey is then used by XChaCha20 to encrypt the file (stream cipher).
  • Nonce material is also derived from X25519-related output (split into parts for HChaCha20/XChaCha20 nonce construction).
  • The malware stores only a Base64-encoded X25519 result in the encrypted file, not the temporary random private value.
  • Because the victim lacks the attacker private key, recreating the shared secret and decrypting is infeasible.
  • Encryption is optimized by size:
    • < ~1 MB (0x100000): full-file encryption
    • ~1 MB: partial/ranged encryption for speed while still causing high damage


MITRE ATT&CK Mapping

TacticTechnique IDTechnique Name
Initial AccessT1190Exploit Public-Facing Application
Initial AccessT1078Valid Accounts
Initial AccessT1078.002Valid Accounts: Domain Accounts
ExecutionT1059Command and Scripting Interpreter
ExecutionT1059.001PowerShell
ExecutionT1059.003Windows Command Shell
PersistenceT1547Boot or Logon Autostart Execution
PersistenceT1136Create Account
Privilege EscalationT1068Exploitation for Privilege Escalation
Defense EvasionT1562Impair Defenses
Defense EvasionT1112Modify Registry
Defense EvasionT1027Obfuscated Files or Information
Defense EvasionT1484.001Domain Policy Modification: Group Policy Modification
DiscoveryT1046Network Service Discovery
DiscoveryT1087Account Discovery
DiscoveryT1087.002Account Discovery: Domain Account
DiscoveryT1482Domain Trust Discovery
Lateral MovementT1021Remote Services
Lateral MovementT1021.001Remote Desktop Protocol
Lateral MovementT1021.002SMB/Windows Admin Shares
Lateral MovementT1021.004SSH
CollectionT1074Data Staged
CollectionT1074.001Local Data Staging
CollectionT1039Data from Network Shared Drive
ExfiltrationT1048Exfiltration Over Alternative Protocol
ExfiltrationT1048.001Unencrypted/Obfuscated Non-C2 Protocol
Command & ControlT1071Application Layer Protocol
Command & ControlT1071.001Web Protocols
Command & ControlT1219Remote Access Software
ImpactT1486Data Encrypted for Impact
ImpactT1489Service Stop
ImpactT1552Unsecured Credentials

This post is licensed under CC BY 4.0 by the author.