Ransomware gangs leverage Shanya EXE packer to evade EDR detection
Summary
Hide ▲
Show ▼
Multiple ransomware gangs, including Medusa, Qilin, Crytox, and Akira, are using the Shanya packer-as-a-service platform to deploy payloads that disable endpoint detection and response (EDR) solutions. The Shanya service emerged in late 2024 and has been observed in various regions, including Tunisia, the UAE, Costa Rica, Nigeria, and Pakistan. The service provides customized payloads with unique encryption and compression, making detection difficult. Sophos researchers found that Shanya performs checks for EDR solutions by triggering unhandled exceptions or crashes under user-mode debuggers, disrupting automated analysis. The payloads are inserted into a memory-mapped copy of 'shell32.dll,' never touching the disk, and are decrypted and decompressed in memory. The EDR killers use legitimately signed and unsigned drivers to disable security products, with the signed driver used for privilege escalation and the unsigned driver executing kill commands based on a hardcoded list of processes and services.
Timeline
-
09.12.2025 02:00 1 articles · 23h ago
Ransomware gangs adopt Shanya EXE packer to evade EDR detection
Multiple ransomware gangs, including Medusa, Qilin, Crytox, and Akira, have been observed using the Shanya packer-as-a-service platform to deploy payloads that disable endpoint detection and response (EDR) solutions. The service emerged in late 2024 and has been observed in various regions, including Tunisia, the UAE, Costa Rica, Nigeria, and Pakistan. The payloads are customized with unique encryption and compression, making detection difficult. Sophos researchers found that Shanya performs checks for EDR solutions by triggering unhandled exceptions or crashes under user-mode debuggers. The payloads are inserted into a memory-mapped copy of 'shell32.dll' and decrypted in memory. The EDR killer uses legitimately signed and unsigned drivers to disable security products.
Show sources
- Ransomware gangs turn to Shanya EXE packer to hide EDR killers — www.bleepingcomputer.com — 09.12.2025 02:00
Information Snippets
-
Shanya packer-as-a-service emerged in late 2024 and has gained popularity among ransomware gangs.
First reported: 09.12.2025 02:001 source, 1 articleShow sources
- Ransomware gangs turn to Shanya EXE packer to hide EDR killers — www.bleepingcomputer.com — 09.12.2025 02:00
-
Ransomware groups Medusa, Qilin, Crytox, and Akira have been confirmed to use the Shanya service.
First reported: 09.12.2025 02:001 source, 1 articleShow sources
- Ransomware gangs turn to Shanya EXE packer to hide EDR killers — www.bleepingcomputer.com — 09.12.2025 02:00
-
Shanya provides customized payloads with unique encryption and compression to evade detection.
First reported: 09.12.2025 02:001 source, 1 articleShow sources
- Ransomware gangs turn to Shanya EXE packer to hide EDR killers — www.bleepingcomputer.com — 09.12.2025 02:00
-
Payloads are inserted into a memory-mapped copy of 'shell32.dll' and decrypted in memory.
First reported: 09.12.2025 02:001 source, 1 articleShow sources
- Ransomware gangs turn to Shanya EXE packer to hide EDR killers — www.bleepingcomputer.com — 09.12.2025 02:00
-
Shanya performs checks for EDR solutions by triggering unhandled exceptions or crashes under user-mode debuggers.
First reported: 09.12.2025 02:001 source, 1 articleShow sources
- Ransomware gangs turn to Shanya EXE packer to hide EDR killers — www.bleepingcomputer.com — 09.12.2025 02:00
-
The EDR killer uses legitimately signed ThrottleStop.sys (rwdrv.sys) and unsigned hlpdrv.sys drivers.
First reported: 09.12.2025 02:001 source, 1 articleShow sources
- Ransomware gangs turn to Shanya EXE packer to hide EDR killers — www.bleepingcomputer.com — 09.12.2025 02:00
-
The signed driver is used for privilege escalation, while the unsigned driver disables security products.
First reported: 09.12.2025 02:001 source, 1 articleShow sources
- Ransomware gangs turn to Shanya EXE packer to hide EDR killers — www.bleepingcomputer.com — 09.12.2025 02:00
-
Sophos observed recent ClickFix campaigns employing the Shanya service to package the CastleRAT malware.
First reported: 09.12.2025 02:001 source, 1 articleShow sources
- Ransomware gangs turn to Shanya EXE packer to hide EDR killers — www.bleepingcomputer.com — 09.12.2025 02:00