Evasion and Persistence via Hidden Hyper-V Virtual Machines
The Curly COMrades threat actor uses hidden Hyper-V virtual machines on compromised Windows 10 hosts to establish covert, persistent access. They deploy a minimal Alpine Linux VM running custom malware for reverse shell and proxy functions, effectively evading traditional endpoint detection and response (EDR) tools. Persistence is maintained through PowerShell scripts, Kerberos ticket manipulation, and local account creation. This technique allows attackers to create stealthy remote operating environments that are difficult to detect and remove. Indicators include specific malware hashes, IP addresses, and domains linked to their command and control infrastructure. No known public exploits exist yet, but the approach demonstrates advanced evasion and lateral movement capabilities. European organizations using Windows 10 with Hyper-V enabled are at risk, especially those with critical infrastructure or sensitive data. Mitigation requires enhanced monitoring of virtualization layers, Kerberos activity, and PowerShell usage. Collaboration with CERTs, as demonstrated with Georgian CERT, is vital for threat intelligence sharing and response.
AI Analysis
Technical Summary
This threat involves the Curly COMrades advanced persistent threat (APT) group exploiting Hyper-V virtualization technology on compromised Windows 10 machines to create hidden virtual machines (VMs) running a minimal Alpine Linux environment. Within these concealed VMs, the attackers deploy custom malware that provides reverse shell and proxy capabilities, enabling covert command and control communication while bypassing host-based endpoint detection and response (EDR) systems. The use of Hyper-V virtualization as an evasion technique is notable because it leverages legitimate system features to hide malicious activity from traditional security tools that monitor the host OS. Persistence mechanisms include PowerShell scripts that automate VM creation and management, manipulation of Kerberos tickets to maintain authenticated access, and creation of local user accounts to ensure continued foothold. The investigation was supported by international cooperation with the Georgian CERT, which helped analyze the attackers’ command and control infrastructure, including associated IP addresses and domains. Indicators of compromise (IOCs) such as malware hashes and network artifacts have been identified but no public exploits are currently known. The threat actor’s use of virtualization for lateral movement and proxying traffic complicates detection and response efforts. The attack chain demonstrates a sophisticated blend of virtualization abuse, credential manipulation, and script-based persistence, highlighting the need for advanced monitoring and threat hunting capabilities focused on virtualization layers and authentication services.
Potential Impact
For European organizations, this threat poses significant risks to confidentiality, integrity, and availability. The hidden Hyper-V VMs enable attackers to maintain stealthy, persistent access to sensitive networks, potentially leading to prolonged data exfiltration, espionage, or disruption. The evasion of traditional EDR tools means that many organizations may be unaware of the compromise until significant damage occurs. Critical infrastructure sectors, government agencies, and enterprises with Windows 10 systems running Hyper-V are particularly vulnerable. The manipulation of Kerberos tickets can facilitate lateral movement across enterprise networks, increasing the scope of compromise. Additionally, the creation of local accounts and use of PowerShell scripts complicate incident response and remediation. The covert proxying capabilities may also enable attackers to pivot and mask their command and control traffic, further hindering detection. Overall, the threat could lead to severe operational disruptions, loss of sensitive data, and reputational damage if not promptly identified and mitigated.
Mitigation Recommendations
1. Implement advanced monitoring of Hyper-V environments, including logging and alerting on VM creation, modification, and unusual VM activity. 2. Monitor PowerShell usage closely, employing script block logging and constrained language mode to detect suspicious automation related to VM management. 3. Audit Kerberos ticket usage and implement anomaly detection to identify unusual ticket requests or manipulations indicative of persistence or lateral movement. 4. Enforce strict local account management policies, including regular audits and removal of unauthorized accounts. 5. Deploy network monitoring to detect proxy and reverse shell traffic patterns, especially those communicating with known malicious IPs and domains identified in the indicators. 6. Utilize endpoint detection tools capable of monitoring virtualization layers and cross-VM activities. 7. Conduct threat hunting exercises focusing on virtualization abuse and credential manipulation techniques. 8. Maintain up-to-date threat intelligence feeds and collaborate with national and international CERTs for timely information sharing. 9. Harden Windows 10 hosts by disabling Hyper-V if not required or restricting its use to trusted administrators. 10. Apply the principle of least privilege to limit the ability of attackers to create or manage virtual machines and local accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Poland, Italy, Spain
Indicators of Compromise
- hash: 1a6803d9a2110f86bb26fcfda3606302
- hash: 22515396e03a5b2533cff96f3087b98f
- hash: c6dbf3de8fd1fc9914fae7a24aa3c43d
- hash: cb1c3d52a74a6ca2ba8fe86e06462a6d
- ip: 194.87.245.239
- ip: 45.43.91.10
- domain: yohi.cc
- domain: 77.221.137.132.sslip.io
Evasion and Persistence via Hidden Hyper-V Virtual Machines
Description
The Curly COMrades threat actor uses hidden Hyper-V virtual machines on compromised Windows 10 hosts to establish covert, persistent access. They deploy a minimal Alpine Linux VM running custom malware for reverse shell and proxy functions, effectively evading traditional endpoint detection and response (EDR) tools. Persistence is maintained through PowerShell scripts, Kerberos ticket manipulation, and local account creation. This technique allows attackers to create stealthy remote operating environments that are difficult to detect and remove. Indicators include specific malware hashes, IP addresses, and domains linked to their command and control infrastructure. No known public exploits exist yet, but the approach demonstrates advanced evasion and lateral movement capabilities. European organizations using Windows 10 with Hyper-V enabled are at risk, especially those with critical infrastructure or sensitive data. Mitigation requires enhanced monitoring of virtualization layers, Kerberos activity, and PowerShell usage. Collaboration with CERTs, as demonstrated with Georgian CERT, is vital for threat intelligence sharing and response.
AI-Powered Analysis
Technical Analysis
This threat involves the Curly COMrades advanced persistent threat (APT) group exploiting Hyper-V virtualization technology on compromised Windows 10 machines to create hidden virtual machines (VMs) running a minimal Alpine Linux environment. Within these concealed VMs, the attackers deploy custom malware that provides reverse shell and proxy capabilities, enabling covert command and control communication while bypassing host-based endpoint detection and response (EDR) systems. The use of Hyper-V virtualization as an evasion technique is notable because it leverages legitimate system features to hide malicious activity from traditional security tools that monitor the host OS. Persistence mechanisms include PowerShell scripts that automate VM creation and management, manipulation of Kerberos tickets to maintain authenticated access, and creation of local user accounts to ensure continued foothold. The investigation was supported by international cooperation with the Georgian CERT, which helped analyze the attackers’ command and control infrastructure, including associated IP addresses and domains. Indicators of compromise (IOCs) such as malware hashes and network artifacts have been identified but no public exploits are currently known. The threat actor’s use of virtualization for lateral movement and proxying traffic complicates detection and response efforts. The attack chain demonstrates a sophisticated blend of virtualization abuse, credential manipulation, and script-based persistence, highlighting the need for advanced monitoring and threat hunting capabilities focused on virtualization layers and authentication services.
Potential Impact
For European organizations, this threat poses significant risks to confidentiality, integrity, and availability. The hidden Hyper-V VMs enable attackers to maintain stealthy, persistent access to sensitive networks, potentially leading to prolonged data exfiltration, espionage, or disruption. The evasion of traditional EDR tools means that many organizations may be unaware of the compromise until significant damage occurs. Critical infrastructure sectors, government agencies, and enterprises with Windows 10 systems running Hyper-V are particularly vulnerable. The manipulation of Kerberos tickets can facilitate lateral movement across enterprise networks, increasing the scope of compromise. Additionally, the creation of local accounts and use of PowerShell scripts complicate incident response and remediation. The covert proxying capabilities may also enable attackers to pivot and mask their command and control traffic, further hindering detection. Overall, the threat could lead to severe operational disruptions, loss of sensitive data, and reputational damage if not promptly identified and mitigated.
Mitigation Recommendations
1. Implement advanced monitoring of Hyper-V environments, including logging and alerting on VM creation, modification, and unusual VM activity. 2. Monitor PowerShell usage closely, employing script block logging and constrained language mode to detect suspicious automation related to VM management. 3. Audit Kerberos ticket usage and implement anomaly detection to identify unusual ticket requests or manipulations indicative of persistence or lateral movement. 4. Enforce strict local account management policies, including regular audits and removal of unauthorized accounts. 5. Deploy network monitoring to detect proxy and reverse shell traffic patterns, especially those communicating with known malicious IPs and domains identified in the indicators. 6. Utilize endpoint detection tools capable of monitoring virtualization layers and cross-VM activities. 7. Conduct threat hunting exercises focusing on virtualization abuse and credential manipulation techniques. 8. Maintain up-to-date threat intelligence feeds and collaborate with national and international CERTs for timely information sharing. 9. Harden Windows 10 hosts by disabling Hyper-V if not required or restricting its use to trusted administrators. 10. Apply the principle of least privilege to limit the ability of attackers to create or manage virtual machines and local accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://businessinsights.bitdefender.com/curly-comrades-evasion-persistence-hidden-hyper-v-virtual-machines"]
- Adversary
- Curly COMrades
- Pulse Id
- 690b1894c92da49dff19e600
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash1a6803d9a2110f86bb26fcfda3606302 | — | |
hash22515396e03a5b2533cff96f3087b98f | — | |
hashc6dbf3de8fd1fc9914fae7a24aa3c43d | — | |
hashcb1c3d52a74a6ca2ba8fe86e06462a6d | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip194.87.245.239 | — | |
ip45.43.91.10 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainyohi.cc | — | |
domain77.221.137.132.sslip.io | — |
Threat ID: 690b1bc097eccd90738774a6
Added to database: 11/5/2025, 9:41:20 AM
Last enriched: 11/5/2025, 9:53:51 AM
Last updated: 11/5/2025, 2:10:57 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Norton Researchers Crack Midnight Ransomware, Release Free Decryptor
MediumRisk 'Comparable' to SolarWinds Incident Lurks in Popular Software Update Tool
MediumFormer cybersecurity firm experts attempted to extort five U.S. companies in 2023 using BlackCat ransomware attacks
MediumUpdate on Attacks by Threat Group APT-C-60
MediumUS Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.