CATEGORIES

VanHelsing, new RaaS in Town

March 23, 2025

Key Points

  • VanHelsingRaaS is a new and rapidly growing ransomware-as-a-service (RaaS) affiliate program launched on March 7, 2025. The RaaS model allows a wide range of participants, from experienced hackers to newcomers, to get involved with a $5,000 deposit. Affiliates keep 80% of the ransom payments, while the core operators earn 20%. The only rule is not to target the Commonwealth of Independent States (CIS).
  • Check Point Research discovered two VanHelsing ransomware variants targeting Windows, but as the RaaS mentions in its advertisement, it provides more offerings “targeting Linux, BSD, ARM, and ESXi systems”. The program provides an intuitive control panel that simplifies operating ransomware attacks. Check Point Research obtained two variants of the VanHelsing Ransomware, compiled just five days apart. The newest variant shows significant updates, highlighting the fast-paced evolution of this ransomware.
  • In less than two weeks since its introduction to the cybercrime community, this ransomware operation has already infected three known victims, demanding large ransom payments for decryption and the deletion of stolen data. During negotiations, they demanded $500,000 to be paid to a specified Bitcoin wallet.

VanHelsing RaaS

In recent weeks, a new and rapidly expanding ransomware-as-a-service (RaaS) program called VanHelsingRaaS has been making waves in the cybercrime world. Launched on March 7, 2025, this service has already demonstrated its rapid growth and deadly potential, having infected three victims within just two weeks of its introduction. Reputable affiliates can join for free, while new affiliates must pay a $5,000 deposit to gain access to the program. After two blockchain confirmations of the victim’s ransom payment, the affiliates receive 80% of the revenue, while the remaining 20% is paid to the RaaS operators. Affiliates are provided with an easy-to-use control panel to manage attacks and a cross-platform locker, VanHelsing, which targets a wide variety of systems, including “Windows, Linux, BSD, ARM, and ESXi systems”.

Figure 1 — VanHelsing RaaS advertisement.

This multi-platform support significantly broadens the reach of the ransomware, enabling it to target a wide variety of systems. In addition to the locker, affiliates are provided with a dedicated control panel that facilitates the management and execution of ransomware campaigns. However, there is one crucial rule: encryption of systems in CIS (Commonwealth of Independent States) countries is strictly prohibited in typical behavior observed in Russian cybercrime.

Figure 2 — Rules, CIS countries encryption not allowed.
Figure 3 — VanHelsing Control Panel.

In less than two weeks since its introduction to the cybercrime community, this RaaS has already infected three victims, demanding large ransom payments for decryption and the deletion of stolen data. During negotiations, they demanded $500,000 to be paid to a specified Bitcoin wallet.

Figure 4 — Ransom demand and Bitcoin wallet.

VanHelsing Ransomware

The ransomware associated with the VanHelsing RaaS was first discovered on March 16, 2025. It is written in C++, and based on the compilation timestamp, the sample appears to have been deployed on the same day against the first victim targeted by this affiliate group. The ransomware accepts multiple command-line arguments that control the encryption process, such as whether to encrypt network and local drives or specific directories and files. It seems that the ransomware is still in its early stages of development, as some functionality appears to be incomplete. While log messages for these features are present, the actual actions associated with them do not seem to be implemented at this stage.

The ransom note dropped as README.txt on each enumerated folder, informs the victim that their network has been breached, and their personal data, financial reports, and important documents have been encrypted. The attacker demands Bitcoin for file restoration, warning that the use of third-party decryptors will result in permanent data loss. They warn that their encryption is unbreakable and that paying the ransom is the only way to recover the files. The note ends with an invitation to contact the attacker.

Figure 5 — Ransomware Note.

The ransomware contains two embedded images, which are dropped into the C:\\Windows\\Web folder. The vhlocker.png file is used to replace the victim’s desktop background with the RaaS logo, while vhlocker.ico is intended to associate the encrypted files, which have the .vanlocker extension, with the .ico file type. However, this is a flaw in the ransomware. The encrypted files are actually given the .vanhelsing extension, not .vanlocker, meaning the .ico file is not properly associated with the encrypted files.

Figure 6 — Desktop Background Image.

The ransomware executable still contains the PDB file path, which provides some information about its development environment. This PDB file path includes the development path and project name associated with the malicious program, revealing details that could potentially help trace other projects developed by the same author.

In this particular case, the PDB file is located at the following path:

C:\Users\ADMINI~1\AppData\Local\Temp\2\cd9563b4cbc415b3920633b93c0d351b\1-locker\Release\1-locker.pdb

Based on this search, Check Point Research discovered two additional files: a second variant of the VanHelsing ransomware, compiled on March 11, 2025, which contains differences compared to the updated version from March 16. The second file, identified based on its PDB path, is an executable that loads an embedded binary into memory. However, the buffer associated with this executable contains no valid data, rendering the loader ineffective.

Technical Analysis

Command-line Arguments

The VanHelsing Ransomware supports multiple command-line arguments, enabling attackers to fine-tune the encryption process based on their objectives. These arguments dictate various aspects of the ransomware’s behavior, including target selection, execution parameters, and stealth features. Below are the supported arguments:

  • -h, Displays the list of supported command-line arguments and usage instructions for VanHelsing Ransomware.
  • -v, Prints all logs during execution, providing detailed output for debugging or monitoring the ransomware’s actions.
  • --no-logs, Suppresses the printing of logs during ransomware execution.
  • --Driver $DRIVER, Specifies a target drive for encryption, allowing the ransomware to encrypt all files and folders on the selected drive.
  • --Directory $DIRECTORY, Specifies a target folder for encryption, allowing the ransomware to encrypt all files and subfolders within the selected folder.
  • --File $FILE, Specifies the single file to be encrypted.
  • --Force, Allows multiple instances of the ransomware to run simultaneously. If the flag is not present, the ransomware attempts to create a mutex “Global\VanHelsing”, aborting execution if it already exists, This ensures that only one instance without this flag can run at a time.
  • --no-priority, If the flag is not set, the malware increases the priority of its process, causing the system to prioritize the ransomware’s execution over other processes.
  • --no-wallpaper, If this flag is set, the malware will not change the desktop background image.
  • --no-local, If this flag is set, the ransomware will not encrypt any local files present on the machine, potentially limiting its attack to network drives, remote systems, or specific directories.
  • --no-mounted, This flag ensures that the ransomware only encrypts fixed local drives (the primary hard drive, (DRIVE_FIXED) and excludes any remote or mounted drives, such as network shares or external storage devices.
  • --no-network, When this flag is set, the ransomware will avoid encrypting network drives, focusing only on local drives or other specified targets.
  • --no-admin, Allows the ransomware to execute even if the process is not running with administrative privileges.
  • --Silent, Silent ransomware process mode; later we elaborate on this feature in more detail. For instance, files on network shares encrypted in this mode won’t have their extension changed.
  • --skipshadow, When this command is specified, the ransomware skips the deletion of shadow copies, potentially leaving system backups intact.
  • --spread-smb, Enables the ransomware to spread to SMB servers by copying and executing the ransomware from the network shares.
  • --spread-vcenter, Not implemented yet, likely indicates that the malware would support a feature for spreading or propagating through a vCenter server. vCenter is a centralized management platform for VMware vSphere environments, often used to manage virtualized infrastructure. This functionality appears to be a placeholder for logic to be added later, potentially making use of exploits. However, currently, the malware simply terminates when this argument is set.
  • --no-autostart, Not implemented yet, possibly if this argument is not set, the ransomware would not configure itself to launch automatically when the system boots.
  • --system, which has not been implemented yet. Currently, it simply prints “Running as a system” when the verbose logging argument (-v) is set.

We have analyzed two samples of VanHelsing Ransomware, compiled five days apart based on their timestamps. The latest version introduces new command-line arguments and features. This suggests that the malware is actively being updated, and new arguments are likely to be introduced in future versions of the ransomware.

Delete Shadow Copies

Shadow copies are backup copies of files or volumes created by Windows’ Volume Shadow Copy Service (VSS), often used for restoring files or recovering from system failures. Ransomware deletes shadow copies to prevent victims from restoring their encrypted files using Windows’ built-in backup mechanisms. By removing these backups, the attackers increase the likelihood that victims will have no choice but to pay the ransom for file recovery.

In the malicious binary, the function responsible for deleting shadow copies begins by initializing the Component Object Model (COM) through CoInitializeEx and CoInitializeSecurity, enabling interaction with system management services. It then determines the system architecture using GetNativeSystemInfo before creating an instance of the appropriate COM object via CoCreateInstance, ensuring compatibility with the target environment.

Figure 7 — COM Initialization and System Architecture Setup.

The malware connects to the ROOT\\CIMV2 namespace and executes a WMI query to retrieve all shadow copies stored on the local system using the Win32_ShadowCopy class. It allows the malware to access and manage the shadow copies. Then, enumerates through the retrieved shadow copies and creates child processes which delete them by shadow ID.

"cmd.exe /c C:\\Windows\\System32\\wbem\\WMIC.exe shadowcopy where \"ID='%s'\" delete"

Local Drive Enumeration

The ransomware’s local encryption routine requires obtaining the existing drives. Initially, it calls GetLogicalDriveStringsW(0, 0), which returns the buffer size for the logical drive strings. Then, it calls the function again with the correct buffer size, obtaining a buffer with strings that specify valid drives in the system.

Figure 8 — Function retrieving machine drives.

Once all drives on the machine are identified, the ransomware enumerates them, selecting only fixed local drives and mounted drives unless executed with the --no-mounted argument, in which case mounted drives are excluded from encryption.

Figure 9 — Drive type checks.

The ransomware would later recursively enumerate and encrypt all files and folders on the selected drives, ensuring comprehensive data encryption across the targeted storage locations.

Blacklisted Files & Folders

The ransomware begins the encryption process by enumerating folders and files using the Windows API functions FindFirstFileW, FindNextFileW, and FindClose. To prevent rendering the system completely unusable, it selectively excludes certain folders, files, and file extensions from encryption, ensuring that critical system components remain intact.

The files contained in the below folders are excluded from encryption:

"tmp", "winnt", "temp", "thumb", "$Recycle.Bin", "$RECYCLE.BIN", "System Volume Information", "Boot", "Windows", "Trend Micro", "program files", "program files(x86)", "tor browser", "windows", "intel", "all users", "msocache", "perflogs", "default", "microsoft"

While the below file extensions and files are excluded from being encrypted for various reasons, mostly due to being critical for Windows functionality:

".vanlocker", ".exe", ".dll", ".lnk", ".sys", ".msi", "boot.ini", "autorun.inf", "bootfont.bin", "bootsect.bak", "desktop.ini", "iconcache.db", "ntldr", "ntuser.dat", "ntuser.dat.log", "ntuser.ini", "thumbs.db", "GDIPFONTCACHEV1.DAT", "d3d9caps.dat", "LOGS.txt", "README.txt", ".bat", ".bin", ".com", ".cmd", ".386", ".adv", ".ani", ".cab", ".ico", ".mod", ".msstyles", ".msu", ".nomedia", ".ps1", ".rtp", ".syss", ".prf", ".deskthemepack", ".cur", ".cpl", ".diagcab", ".diagcfg", ".diagpkg", ".dll", ".drv", ".hlp", ".pdb", ".hta", ".key", ".lock", ".ldf", ".ocx", ".icl", ".icns", ".ics", ".idx", ".mod", ".mpa", ".msc", ".msp", ".nls", ".rom", ".scr", ".shs", ".spl", ".theme", ".themepack", ".wpx"

A similar mistake to the one previously mentioned regarding the .ico file association occurs in the blacklist of excluded file extensions. The ransomware mistakenly excludes .vanlocker files from encryption, even though the actual encrypted files use the .vanhelsing extension. This oversight means that if a second instance of the ransomware runs, it could encrypt already encrypted files again, leading to double encryption.

Network Drive Enumeration

By default, the ransomware will attempt to encrypt any connected network drives, unless the --no-network command-line argument is specified. The function responsible for encrypting the network drives runs as a separate thread.

Initially, retrieves the local hostname and its corresponding IP address, then proceeds to scan a range of IP addresses [1-255). For each IP address in the local network, the thread will attempt to connect to port 445, identifying which machines on the local network are running SMB.

Figure 10 — Scanning IP for open SMB port.

For each running SMB server, the ransomware will call NetShareEnum and proceed to construct a network path to access a shared resource on the remote machine. Then, the ransomware continues with folder and file enumeration, followed by encryption. It is worth mentioning that in “Silent” mode, network shares will have their files encrypted without the extension being changed to .vanhelsing.

SMB Spreading & Encryption

If the ransomware is executed with the --spread-smb command-line argument, it still encrypts network shares, but the approach differs from the one mentioned above. The ransomware contains an embedded psexec.exe binary, which is dropped into the Temp folder. Similar to network encryption, the malware will scan for SMB shares and try to determine if the share has write permissions. Network shares containing NETLOGON or sysvol are excluded from encryption, as encrypting them could potentially interrupt user authentication.

Figure 11 — Excluding NETLOGON and sysvol shares.

VanHelsing locker will copy itself to the network share as $SHARE\\\\vanlocker.exe. Executing psexec.exe will trigger the ransomware process on the network share, which will then proceed to encrypt the files. The ransomware on the share will execute without encrypting mounted or other network shares. Below are the execution arguments:

cmd.exe /c $TEMP/psexec.exe -accepteula \\\\$SHARE -c -f $SHARE\\vanlocker.exe -d --no-mounted --no-network < NUL

Silent Encryption Mode

To avoid triggering detection flags added in the latest version, the ransomware includes the --Silent command-line argument. When this flag is specified, the ransomware splits its functionality into two parts.

During “Normal” execution, the ransomware:

  1. Enumerates folders.
  2. Enumerates files.
  3. Encrypts files.
  4. Renames files with the ransomware extension.

In “Silent” mode, the ransomware temporarily skips the file renaming step (Step 4). Once all the files have been encrypted, it enumerates folders and files once again, this time solely for renaming the files with the ransomware extension.

  1. Enumerates folders.
  2. Enumerates files.
  3. Encrypts all files.
  • The machine is encrypted.
  1. Enumerates folders.
  2. Enumerates files.
  3. Renames files with the ransomware extension.

Under the hood the malware implements this by having the encryption routine accept an argument specifying Normal or Silent operation. These don’t exactly correspond to whether the CLI flag is set: Silent only renames files (adding the .vanhelsing extension) without encrypting, whereas Normal encrypts and renames files, but skips the renaming if --silent is set. Execution without --silent is implemented by just running Normal, whereas execution with --silent is implemented by first running Normal (which now skips file renaming) and then running Silent.

Figure 12 — Double “Encryption”, Normal & Silent mode.
Figure 13 — Normal encryption function, Silent flag skipping renaming.

When the Silent argument is passed to the function, it is solely responsible for adding the ransomware extension and nothing else. Before this, the same function was executed with the Normal flag, which is responsible for the encryption.

Figure 14 — Silent encryption function.

The ransomware follows this two-stage process in Silent mode primarily to evade detection and bypass security measures, such as behavioral detection.

File Encryption

The ransomware contains a Curve25519 public key embedded in the code. Two random ephemeral values, sized 32 bytes and 12 bytes, are generated per each encrypted file to use as the key and nonce for file encryption using the ChaCha20 algorithm. These are in turn encrypted using the public key, and the result is formatted into a hexadecimal format to be stored in the file.

Figure 15 — Random keys generation and encryption.

If the file size is approximately 1GB (0x3E800000 bytes) or larger, the ransomware will encrypt only the first 30% of the file contents, starting from the beginning. If the file size is smaller, the entire file will be encrypted. The contents are encrypted in chunks of approximately 1MB (0x100000 bytes).

Figure 16 — File size check and encryption.

VanHelsing Ransomware Encrypted File Structure:

---key---$KEY_HEX---endkey------nonce---$NONCE_HEX---endnonce--$ENCRYPTED_CHUNKS

If the --Silent flag is not set, the file ransomware extension is added immediately. Otherwise, once all the files are encrypted, they are enumerated again, and the extension is changed.

Conclusion

VanHelsingRaaS, a rapidly expanding ransomware-as-a-service program launched in March 2025, has quickly made its mark on the cybercrime landscape. Offering an accessible entry point for affiliates with a low deposit has attracted a diverse range of participants. The program’s growth is evident in the evolution of its ransomware variants, which have expanded beyond Windows with additional offerings targeting “Linux, BSD, ARM, and ESXi systems”. With a user-friendly control panel and frequent updates, VanHelsing is becoming a powerful tool for cybercriminals. Within just two weeks of its launch, it has already caused significant damage, infecting multiple victims and demanding hefty ransoms. This rapid escalation underscores the program’s effectiveness and the evolving nature of ransomware threats, emphasizing the need for robust cybersecurity measures to combat such sophisticated attacks.

Protections

Check Point Threat Emulation and Harmony Endpoint provide comprehensive coverage of attack tactics, file types, and operating systems and protect against the attacks and threats described in this report.

  • Ransomware.Win.FilesMovedOrOverwrites.A
  • Ransomware.Win.TouchTrapFiles.A
  • TS_Ransomware.Win.FilesMovedOrOverwrites.A
  • Trojan.Win.Krap.gl.D
  • Trojan.Wins.Imphash.taim.XT
  • Trojan.Wins.PDB.tapd.ON

Indicators of Compromise

DescriptionValue
VanHelsing Ransomware79106dd259ba5343202c2f669a0a61b10adfadff
e683bfaeb1a695ff9ef1759cf1944fa3bb3b6948
Loader4211cec2f905b9c94674a326581e4a5ae0599df9
Negotiation Onion Pagesvanhelcbxqt4tqie6fuevfng2bsdtxgc7xslo2yo7nitaacdfrlpxnqd.onion
vanhelqmjstkvlhrjwzgjzpq422iku6wlggiz5y5r3rmfdeiaj3ljaid.onion vanhelsokskrlaacilyfmtuqqa5haikubsjaokw47f3pt3uoivh6cgad.onion vanheltarnbfjhuvggbncniap56dscnzz5yf6yjmxqivqmb5r2gmllad.onion
RaaS Onion Pagesvanhelvuuo4k3xsiq626zkqvp6kobc2abry5wowxqysibmqs5yjh4uqd.onion
vanhelwmbf2bwzw7gmseg36qqm4ekc5uuhqbsew4eihzcahyq7sukzad.onion
vanhelxjo52qr2ixcmtjayqqrcodkuh36n7uq7q7xj23ggotyr3y72yd.onion
Bitcoin Walletbc1q0cuvj9eglxk43v9mqmyjzzh6m8qsvsanedwrru
TOXFEE914521FB507AB978107ACE3B69B4CA41DA89859408BAE23E1512E8C2E614A26C5FFD482A3

POPULAR POSTS

BLOGS AND PUBLICATIONS

  • Check Point Research Publications
  • Global Cyber Attack Reports
  • Threat Research
February 17, 2020

“The Turkish Rat” Evolved Adwind in a Massive Ongoing Phishing Campaign

  • Check Point Research Publications
August 11, 2017

“The Next WannaCry” Vulnerability is Here

  • Check Point Research Publications
January 11, 2018

‘RubyMiner’ Cryptominer Affects 30% of WW Networks