Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Evasion and Persistence via Hidden Hyper-V Virtual Machines

0
Medium
Published: Wed Nov 05 2025 (11/05/2025, 09:27:48 UTC)
Source: AlienVault OTX General

Description

The Curly COMrades threat actor uses hidden Hyper-V virtual machines on compromised Windows 10 hosts to establish covert, persistent access. They deploy a minimal Alpine Linux VM running custom malware for reverse shell and proxy functions, effectively evading traditional endpoint detection and response (EDR) tools. Persistence is maintained through PowerShell scripts, Kerberos ticket manipulation, and local account creation. This technique allows attackers to create stealthy remote operating environments that are difficult to detect and remove. Indicators include specific malware hashes, IP addresses, and domains linked to their command and control infrastructure. No known public exploits exist yet, but the approach demonstrates advanced evasion and lateral movement capabilities. European organizations using Windows 10 with Hyper-V enabled are at risk, especially those with critical infrastructure or sensitive data. Mitigation requires enhanced monitoring of virtualization layers, Kerberos activity, and PowerShell usage. Collaboration with CERTs, as demonstrated with Georgian CERT, is vital for threat intelligence sharing and response.

AI-Powered Analysis

AILast updated: 11/05/2025, 09:53:51 UTC

Technical Analysis

This threat involves the Curly COMrades advanced persistent threat (APT) group exploiting Hyper-V virtualization technology on compromised Windows 10 machines to create hidden virtual machines (VMs) running a minimal Alpine Linux environment. Within these concealed VMs, the attackers deploy custom malware that provides reverse shell and proxy capabilities, enabling covert command and control communication while bypassing host-based endpoint detection and response (EDR) systems. The use of Hyper-V virtualization as an evasion technique is notable because it leverages legitimate system features to hide malicious activity from traditional security tools that monitor the host OS. Persistence mechanisms include PowerShell scripts that automate VM creation and management, manipulation of Kerberos tickets to maintain authenticated access, and creation of local user accounts to ensure continued foothold. The investigation was supported by international cooperation with the Georgian CERT, which helped analyze the attackers’ command and control infrastructure, including associated IP addresses and domains. Indicators of compromise (IOCs) such as malware hashes and network artifacts have been identified but no public exploits are currently known. The threat actor’s use of virtualization for lateral movement and proxying traffic complicates detection and response efforts. The attack chain demonstrates a sophisticated blend of virtualization abuse, credential manipulation, and script-based persistence, highlighting the need for advanced monitoring and threat hunting capabilities focused on virtualization layers and authentication services.

Potential Impact

For European organizations, this threat poses significant risks to confidentiality, integrity, and availability. The hidden Hyper-V VMs enable attackers to maintain stealthy, persistent access to sensitive networks, potentially leading to prolonged data exfiltration, espionage, or disruption. The evasion of traditional EDR tools means that many organizations may be unaware of the compromise until significant damage occurs. Critical infrastructure sectors, government agencies, and enterprises with Windows 10 systems running Hyper-V are particularly vulnerable. The manipulation of Kerberos tickets can facilitate lateral movement across enterprise networks, increasing the scope of compromise. Additionally, the creation of local accounts and use of PowerShell scripts complicate incident response and remediation. The covert proxying capabilities may also enable attackers to pivot and mask their command and control traffic, further hindering detection. Overall, the threat could lead to severe operational disruptions, loss of sensitive data, and reputational damage if not promptly identified and mitigated.

Mitigation Recommendations

1. Implement advanced monitoring of Hyper-V environments, including logging and alerting on VM creation, modification, and unusual VM activity. 2. Monitor PowerShell usage closely, employing script block logging and constrained language mode to detect suspicious automation related to VM management. 3. Audit Kerberos ticket usage and implement anomaly detection to identify unusual ticket requests or manipulations indicative of persistence or lateral movement. 4. Enforce strict local account management policies, including regular audits and removal of unauthorized accounts. 5. Deploy network monitoring to detect proxy and reverse shell traffic patterns, especially those communicating with known malicious IPs and domains identified in the indicators. 6. Utilize endpoint detection tools capable of monitoring virtualization layers and cross-VM activities. 7. Conduct threat hunting exercises focusing on virtualization abuse and credential manipulation techniques. 8. Maintain up-to-date threat intelligence feeds and collaborate with national and international CERTs for timely information sharing. 9. Harden Windows 10 hosts by disabling Hyper-V if not required or restricting its use to trusted administrators. 10. Apply the principle of least privilege to limit the ability of attackers to create or manage virtual machines and local accounts.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://businessinsights.bitdefender.com/curly-comrades-evasion-persistence-hidden-hyper-v-virtual-machines"]
Adversary
Curly COMrades
Pulse Id
690b1894c92da49dff19e600
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash1a6803d9a2110f86bb26fcfda3606302
hash22515396e03a5b2533cff96f3087b98f
hashc6dbf3de8fd1fc9914fae7a24aa3c43d
hashcb1c3d52a74a6ca2ba8fe86e06462a6d

Ip

ValueDescriptionCopy
ip194.87.245.239
ip45.43.91.10

Domain

ValueDescriptionCopy
domainyohi.cc
domain77.221.137.132.sslip.io

Threat ID: 690b1bc097eccd90738774a6

Added to database: 11/5/2025, 9:41:20 AM

Last enriched: 11/5/2025, 9:53:51 AM

Last updated: 11/5/2025, 2:10:57 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats