DFIR Report – The Gentlemen & SystemBC: A Sneak Peek Behind the Proxy
The Gentlemen is an emerging Ransomware-as-a-Service (RaaS) operation that provides affiliates with versatile, multi-platform lockers. Recent incident response telemetry reveals affiliates utilizing Cobalt Strike and SystemBC for post-exploitation and C2, culminating in highly automated, domain-wide ransomware deployment via Group Policy and built-in lateral movement mechanisms.
Authors: Check Point Research
Source:Check Point
- sha256025fc0976c548fb5a880c83ea3eb21a5f23c5d53c4e51e862bb893c11adf712aThe Gentlemen Windows ransomware payload.
- sha256992c951f4af57ca7cd8396f5ed69c2199fd6fd4ae5e93726da3e198e78bec0a5SystemBC proxy malware payload.
- urlhxxp://tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad[.]onion/The Gentlemen RaaS Tor leak site.
Key Takeaways
- The Gentlemen is a rapidly growing RaaS with over 320 claimed victims, offering multi-OS lockers for Windows, Linux, NAS, BSD, and ESXi.
- Affiliates leverage tools like SystemBC (proxy malware) and Cobalt Strike for covert tunneling, C2, and payload delivery.
- The ransomware features a highly automated lateral movement capability (--spread) using PsExec, WMI, scheduled tasks, and services.
- A powerful --gpo flag allows operators with Domain Controller access to weaponize Active Directory for simultaneous domain-wide encryption.
- The ESXi variant actively terminates VMs, modifies storage buffer settings for faster encryption, and establishes persistence via /bin/.vmware-authd.
Affected Systems
- Windows
- Linux
- NAS
- BSD
- VMware ESXi
Attack Chain
The attack begins with the threat actor gaining Domain Admin privileges on a Domain Controller, followed by network reconnaissance and credential validation. The attacker deploys Cobalt Strike and SystemBC for command-and-control and proxying. Lateral movement is achieved using PsExec, WMI, and scheduled tasks, while defense evasion techniques disable Windows Defender and clear event logs. Finally, the ransomware is deployed domain-wide via Group Policy (GPO) or built-in spreading mechanisms, encrypting files and dropping extortion notes.
Detection Availability
- YARA Rules: Yes
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
- Platforms: Check Point Research
A YARA rule is provided to detect The Gentlemen ransomware written in Go by matching specific strings and the MZ header.
Detection Engineering Assessment
EDR Visibility: High — The attack relies heavily on noisy command-line executions (vssadmin, wevtutil, schtasks, sc, powershell) and drops multiple executables to disk, which are highly visible to EDR. Network Visibility: Medium — SystemBC and Cobalt Strike use encrypted channels (RC4 over SOCKS, HTTPS), but the internal lateral movement via SMB/RPC and internal HTTP staging is visible. Detection Difficulty: Moderate — While the ransomware uses defense evasion (disabling Defender), the sheer volume of administrative commands, GPO modifications, and lateral movement attempts provides numerous detection opportunities.
Required Log Sources
- Windows Event Log (Security)
- Sysmon (Event ID 1, 3, 11, 12, 13)
- PowerShell Script Block Logging (Event ID 4104)
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Look for vssadmin.exe or wmic.exe executing shadow copy deletion commands. | Process execution logs (Event ID 4688 or Sysmon Event ID 1) | Impact | Low |
| Monitor for wevtutil.exe clearing multiple event logs (System, Application, Security) in rapid succession. | Process execution logs (Event ID 4688 or Sysmon Event ID 1) | Defense Evasion | Low |
| Identify PowerShell commands attempting to disable Windows Defender real-time monitoring or adding root drive exclusions. | PowerShell Script Block Logging (Event ID 4104) | Defense Evasion | Low |
| Detect the creation of scheduled tasks named UpdateSystem, UpdateUser, DefU, or DefS running from C:\Temp or C:\ProgramData. | Scheduled Task creation logs (Event ID 4698) | Persistence | Low |
| Hunt for ESXi commands modifying advanced configuration settings (esxcfg-advcfg) or forcefully killing VM processes (esxcli vm process kill). | ESXi shell/syslog logs | Impact | Medium |
Control Gaps
- Lack of strict egress filtering allowing SystemBC/Cobalt Strike C2
- Insufficient protection of Domain Controller GPO objects
- Overly permissive SMB/RPC access between workstations
Key Behavioral Indicators
- Process ancestry involving cmd.exe spawning from psexesvc.exe or wmiprvse.exe
- Creation of ScheduledTasks.xml in SYSVOL by unexpected processes
- Modifications to LSA registry keys allowing anonymous access
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Isolate infected hosts and block communication to known C2 IPs (91.107.247.163, 45.86.230.112).
- Reset all Domain Admin and compromised user credentials.
- Review and revert any unauthorized Group Policy Objects (GPOs) created recently.
Infrastructure Hardening
- Restrict SMB and RPC communication between workstations to prevent lateral movement.
- Implement strict egress filtering to block unauthorized outbound proxy and C2 connections.
- Harden ESXi hosts by disabling SSH if not needed and restricting access to management interfaces.
User Protection
- Ensure EDR agents are configured with tamper protection to prevent unauthorized disabling via PowerShell.
- Deploy LAPS (Local Administrator Password Solution) to prevent lateral movement using local credentials.
Security Awareness
- Train incident response teams on identifying and responding to human-operated ransomware precursors like SystemBC and Cobalt Strike.
MITRE ATT&CK Mapping
- T1078 - Valid Accounts
- T1059.003 - Command Shell
- T1059.001 - PowerShell
- T1047 - Windows Management Instrumentation
- T1053.005 - Scheduled Task
- T1569.002 - Service Execution
- T1543.003 - Windows Service
- T1547.009 - rc.local
- T1053.003 - Cron
- T1562.001 - Disable or Modify Tools
- T1070.001 - Clear Windows Event Logs
- T1070.004 - File Deletion
- T1486 - Data Encrypted for Impact
- T1490 - Inhibit System Recovery
- T1021.002 - SMB/Windows Admin Shares
- T1021.006 - Windows Remote Management
- T1090.003 - Multi-hop Proxy
Additional IOCs
- Ips:
91[.]107[.]247[.]163- Cobalt Strike C&C45[.]86[.]230[.]112- SystemBC C&C
- Urls:
hxxp://tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad[.]onion/- The Gentlemen leak site
- File Hashes:
22b38dad7da097ea03aa28d0614164cd25fafeb1383dbc15047e34c8050f6f67(SHA256) - The Gentlemen Windows payload2ed9494e9b7b68415b4eb151c922c82c0191294d0aa443dd2cb5133e6bfe3d5d(SHA256) - The Gentlemen Windows payload3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235(SHA256) - The Gentlemen Windows payload48d9b2ce4fcd6854a3164ce395d7140014e0b58b77680623f3e4ca22d3a6e7fd(SHA256) - The Gentlemen Windows payloadcc14df781475ef0f3f2c441d03a622ea67cd86967526f8758ead6f45174db78e(SHA256) - Embedded psexesvc.exe/psexec.exe binary078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b(SHA256) - Embedded psexesvc.exe/psexec.exe binaryfe1033335a045c696c900d435119d210361966e2fb5cd1ba3382608cfa2c8e68(SHA256) - gentlemen.bmp desktop wallpaper5dc607c8990841139768884b1b43e1403496d5a458788a1937be139594f01dca(SHA256) - The Gentlemen Linux payload788ba200f776a188c248d6c2029f00b5d34be45d4444f7cb89ffe838c39b8b19(SHA256) - The Gentlemen Linux payload1eece1e1ba4b96e6c784729f0608ad2939cfb67bc4236dfababbe1d09268960c(SHA256) - The Gentlemen Linux payload
- Registry Keys:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v GupdateU- Persistence mechanism for the ransomware in the user context.HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v NullSessionShares- Modified to allow null session shares for lateral movement.HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v EveryoneIncludesAnonymous- Modified to loosen LSA anonymous access controls.HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v RestrictAnonymous- Modified to loosen LSA anonymous access controls.HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server /v fDenyTSConnections- Modified to enable Remote Desktop connections.
- File Paths:
C:\ProgramData\r.exe- Staged ransomware payload.C:\ProgramData\g.exe- Staged ransomware payload.C:\ProgramData\o.exe- Staged ransomware payload.C:\Temp\wipefile.tmp- Temporary file used to wipe free disk space.%TEMP%\gentlemen.bmp- Ransomware desktop wallpaper./bin/.vmware-authd- ESXi persistence binary masquerading as legitimate daemon./etc/rc.local.d/local.sh- ESXi boot persistence script.\\<domain>\NETLOGON\<exe>- Ransomware payload staged for GPO deployment.\\<domain>\SYSVOL\<domain>\Policies\{<guid>}\Machine\Preferences\ScheduledTasks\ScheduledTasks.xml- Malicious GPO scheduled task configuration.
- Command Lines:
- Purpose: Disable Windows Defender real-time monitoring | Tools:
powershell.exe| Stage: Defense Evasion |powershell.exe -Command Set-MpPreference -DisableRealtimeMonitoring $true - Purpose: Delete volume shadow copies to prevent recovery | Tools:
vssadmin.exe| Stage: Impact |vssadmin delete shadows /all /quiet - Purpose: Clear Windows Event Logs to hide tracks | Tools:
wevtutil.exe| Stage: Defense Evasion |wevtutil cl System - Purpose: Create a scheduled task for persistence | Tools:
schtasks.exe| Stage: Persistence |schtasks /Create /SC ONSTART /TN UpdateSystem /TR - Purpose: Forcefully kill ESXi VM processes | Tools:
esxcli| Stage: Impact |esxcli vm process kill --type=force --world-id=
- Purpose: Disable Windows Defender real-time monitoring | Tools:
- Other:
D527959A7BC728CB272A0DB683B547F079C98012201A48DD2792B84604E8BC29F6E6BDB8003F- Tox ID for Windows victimsD2CBA43A1AF6D965432AE11487726DB84D2945CF2CD975D7774B76B54AF052418AC2E59ADA69- Tox ID for ESXi victims