Havoc C2 Framework Used To Target Government Organizations
An attack campaign was discovered utilizing the open-source Havoc Command and Control (C2) framework to target government organizations.
The Havoc Demon created by the framework evades detection by disabling the Event Tracing for Windows (ETW) uses CreateThreadpoolWait() to decrypt and execute shellcode reflectively loads the Havocs Demon DLL and resolves virtual addresses using API hashing routines.
The infection chain consisted of malicious documents including a decoy file a downloader a batch script and a benign JPEG file.
Featured Resources
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe