Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TangleCrypt Windows Packer with Ransomware Payloads Evades EDR Using ABYSSWORKER Driver

TangleCrypt Windows Packer with Ransomware Payloads Evades EDR Using ABYSSWORKER Driver

Posted on December 1, 2025December 1, 2025 By CWS

A newly found Home windows malware packer named TangleCrypt has emerged as a critical risk in ransomware assaults, particularly designed to evade endpoint detection and response (EDR) options.

The packer was first noticed throughout a September 2025 ransomware incident involving Qilin ransomware, the place risk actors deployed it alongside the ABYSSWORKER driver to disable safety instruments earlier than encrypting sufferer programs.

TangleCrypt works by hiding malicious payloads by way of a number of layers of encoding, compression, and encryption. The unique executable is saved inside PE sources utilizing base64 encoding, LZ78 compression, and XOR encryption.

This multi-layer strategy makes it troublesome for conventional safety instruments to detect the precise malware hidden contained in the packed executable.

WithSecure Labs safety researchers recognized the malware throughout an incident response investigation, recovering artifacts together with two executables full of TangleCrypt and VMProtect, together with a kernel driver masquerading as a CrowdStrike Falcon Sensor driver.

The payload embedded in these executables was recognized as STONESTOP, an EDR-killer instrument that makes use of the ABYSSWORKER driver to terminate safety processes working on the system forcibly.

The packer employs string encryption and dynamic import resolving to hinder each static and dynamic evaluation.

Though malware authors generally use these methods, the TangleCrypt implementation lacks superior anti-analysis mechanisms, making handbook unpacking comparatively easy for knowledgeable analysts.

Payload Execution Mechanism

TangleCrypt helps two distinct strategies for launching its payload, decided by a configuration string appended to the embedded executable.

The primary technique, recognized by the string “exex64_amd64_block_”, decrypts and executes the payload throughout the similar course of reminiscence.

The second technique, marked with “exex64_amd64__riin”, creates a suspended little one course of and writes the decrypted payload into it earlier than resuming execution.

ProcessMonitor log of ‘b1.exe’ beginning little one technique of itself (Supply – Withsecure Labs)

When executed, the loader first decrypts a small useful resource entry containing a numeric key, similar to “175438”. This secret is then used to XOR-decrypt the bigger payload saved within the PE sources.

The decryption course of follows a particular sequence the place a base64-encoded string is decoded, then LZ78 decompressed, decoded once more from base64, and at last XOR-decrypted to disclose the unique executable.

Upon profitable unpacking, the STONESTOP payload checks for administrative privileges and registers the ABYSSWORKER driver if elevated rights are current.

The motive force then terminates processes matching a predefined listing of safety product names, successfully blinding the system’s defenses earlier than ransomware deployment begins.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:ABYSSWORKER, Driver, EDR, Evades, Packer, Payloads, Ransomware, TangleCrypt, Windows

Post navigation

Previous Post: Microsoft Confirms New Outlook Bug Blocking Excel Attachments
Next Post: BreachLock Named a Leader in 2025 GigaOm Radar Report for Penetration Testing as a Service (PTaaS) for Third Consecutive Year

Related Posts

Microsoft Patch Tuesday August 2025 Released Microsoft Patch Tuesday August 2025 Released Cyber Security News
SCATTERED SPIDER Using Aggressive Social Engineering Techniques to Deceive IT Support Teams SCATTERED SPIDER Using Aggressive Social Engineering Techniques to Deceive IT Support Teams Cyber Security News
Gmail to Drop POP3 mail Fetching to Collect Mail from other Email Accounts Gmail to Drop POP3 mail Fetching to Collect Mail from other Email Accounts Cyber Security News
Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network Cyber Security News
New Fully Undetectable FUD Android RAT Hosted on GitHub New Fully Undetectable FUD Android RAT Hosted on GitHub Cyber Security News
Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News