How to Investigate a The Gentlemen RaaS Infection with SystemBC Proxy Malware

By

What You Need

Introduction

Investigating a ransomware incident often involves understanding the full attack chain, from initial access to final payload deployment. This guide focuses on a specific scenario: an affiliate of The Gentlemen ransomware-as-a-service (RaaS) program deploying SystemBC, a proxy malware commonly used for covert tunneling. The Gentlemen group emerged around mid-2025 and has since claimed over 320 victims, with the majority occurring in early 2026. Their broad locker portfolio covers Windows, Linux, NAS, BSD (Go-based) and ESXi (C-based). SystemBC establishes SOCKS5 tunnels, enabling affiliates to maintain persistence and deliver additional tools. The following steps will help you identify, analyze, and contextualize such an infection using the same methodology as observed by threat researchers.

How to Investigate a The Gentlemen RaaS Infection with SystemBC Proxy Malware
Source: research.checkpoint.com

Step 1: Identify Indicators of The Gentlemen RaaS Activity

Begin by searching for hallmarks of The Gentlemen RaaS within your environment or threat intel. Look for:

If you find any of these indicators in your telemetry, confirm by cross-referencing with known hash values or patterns from threat reports (e.g., Figure 1 and 2 in original DFIR analysis).

Step 2: Detect SystemBC Proxy Malware Deployment

SystemBC is typically deployed after initial compromise via phishing or exploitation. Focus on:

Use EDR queries to find processes that initiate outbound connections and write to %TEMP% or %APPDATA% with obfuscated payloads.

Step 3: Analyze the Affiliate’s Multi-Platform Lockers

The Gentlemen RaaS provides affiliates with a broad locker portfolio. Once SystemBC is confirmed, check for:

Gather all such binaries for sandbox execution (in an isolated environment) to extract IOCs like mutex names, scheduled tasks, and C2 domains.

How to Investigate a The Gentlemen RaaS Infection with SystemBC Proxy Malware
Source: research.checkpoint.com

Step 4: Correlate Botnet Telemetry and Scope

The SystemBC botnet associated with this campaign is not random consumer infections; it's heavily concentrated on corporate and organizational environments. To assess impact:

Document the number of affected endpoints, their roles (e.g., domain controller, file server, database), and any encrypted files if ransom was deployed. This scope will guide containment.

Step 5: Use Threat Intelligence to Contextualize the Attack

Combine your findings with external sources to understand the threat actor’s operational tempo:

Share IOCs (hashes, IPs, domains) with your threat intelligence platform and consider publishing anonymized findings to help the wider community.

Tips

By following these steps, you can systematically investigate a The Gentlemen RaaS infection involving SystemBC, from initial identification through to broader contextual analysis. The key is to integrate network, endpoint, and intelligence sources to uncover the full scope of the incident.

Tags:

Related Articles

Recommended

Discover More

How to Defend Your CI/CD Pipeline and Developer Tools from Supply Chain Attacks on npm PackagesMedical Student Perspectives on Nutrition and Preventive Care in Modern Medical Education: A Comprehensive GuideBeyond Binary: Why Online Interactions Require More Than Bot DetectionTesla Secures First Emissions Credits Down Under as Battery Storage Outshines Electric Vehicles in RevenueNext-Gen Martian Rotorcraft: Q&A on NASA's Post-Ingenuity Helicopter Breakthroughs