Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Havoc

120
Global rank
55 infographic chevron month
Month rank
39 infographic chevron week
Week rank
0
IOCs

Havoc is an advanced post-exploitation framework used by hackers to take control of a system once they've breached it. With Havoc, attackers can run commands remotely, inject malicious processes, and access sensitive data. It's often used in targeted attacks, allowing cybercriminals to stay hidden in a network while stealing information or launching further attacks. Its flexibility and ability to bypass detection make it a serious threat, especially in environments that rely on traditional security tools.

C2 Framework
Type
Unknown
Origin
1 October, 2022
First seen
21 December, 2025
Last seen

How to analyze Havoc with ANY.RUN

C2 Framework
Type
Unknown
Origin
1 October, 2022
First seen
21 December, 2025
Last seen

IOCs

IP addresses
80.66.66.40
179.43.186.224
192.46.211.76
70.77.124.96
3.6.115.182
188.225.9.121
185.243.115.252
185.157.160.127
27.102.132.202
92.118.112.10
194.165.16.32
62.109.3.99
185.248.143.18
23.254.201.207
185.196.10.199
51.255.45.74
88.99.150.167
80.255.6.5
185.43.5.227
89.187.28.133
Domains
adblockext.ru
www2.laboratoriodiagnosticoescobar.com
acad.bmcybersecurity.net
mott54874.b-cdn.net
stingray.gay
aadcdn.the-admiralty.co.uk
launchpad.pusd.fi
backstopsolution.net
login.pusd.fi
acadtr.bmcybersecurity.net
aadcdn.ukho.org
payloads.online
addressverification.support-par8o.com
havoc718.ddns.net
alerts-service.com
banochotelgh.com
bankbubyan.com
artsavingsclub.co.za
laboratoriodiagnosticoescobar.com
charlie-twice.suiteb.io
Last Seen at
Last Seen at

Recent blog posts

post image
Year in Review by ANY.RUN: Key Threats, Solut...
watchers 2228
comments 0
post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 470
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 481
comments 0

What is Havoc malware?

Havoc is a post-exploitation framework used by cybercriminals and penetration testers to perform a variety of attacks and gain deeper control over compromised systems. It is developed by C5pider, written in Golang, C++, and C.

First observed in 2022, it has become notable for its stealth, flexibility, and use of encrypted communications to avoid detection. The malware is used in advanced campaigns, often by threat actors conducting highly targeted attacks.

It has been linked to attacks targeting corporate networks, critical infrastructure, and government entities.

Key technical details include its ability to use reflective DLL injection and direct memory manipulation to execute payloads. It maintains persistence on compromised systems through registry modifications and scheduled tasks, while its communication with command-and-control (C2) servers is highly encrypted

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Havoc malware technical details

Havoc malware has several powerful and dangerous capabilities, making it a significant post-exploitation tool. Some of its primary technical features include:

  • Uses reflective DLL injection to inject its payloads directly into the memory of a process without writing to disk, minimizing the risk of detection.
  • Can perform direct memory manipulation to execute malicious code.
  • Supports multiple communication channels (HTTP/HTTPS, DNS, SMB), all encrypted using TLS, making it difficult to intercept and analyze its traffic.
  • Includes a shellcode loader, capable of disabling Event Tracing for Windows (ETW) and performing system reconnaissance.
  • Can establish persistence using methods such as registry modifications, scheduled tasks, and service creation.
  • Allows operators to upload, download, and manipulate files remotely, which is a key post-exploitation feature for attackers.

Havoc operates primarily as an open-source framework and is typically distributed through phishing campaigns or malicious downloads. Its advanced features include payload generation, encryption (using algorithms like AES and RSA), process injection techniques, and multiple communication channels (HTTP, HTTPS, DNS, and SMB).

Havoc malware execution process

To see how Havoc operates, let’s upload a Havoc sample to the ANY.RUN sandbox.

After executing the sample in the sandbox, the first thing that stands out is the red label in the upper right corner of the screen. This label provides a quick way to determine whether the activity is malicious. In our case, it’s highlighted in red, confirming that the behavior is indeed malicious.

Havoc in ANY.RUN sandbox Analysis of Havoc in the ANY.RUN sandbox

The ANY.RUN sandbox provides a Suricata rule flagging Havoc’s suspicious network activity, which is further evidence of its malicious behavior.

Havoc Suricatain ANY.RUN Malicious network activity detected by Suricata IDS in the ANY.RUN sandbox

The Havoc framework establishes a Command and Control (C2) channel using encrypted protocols such as HTTPS and SMB to evade detection. Its modular architecture allows for functionalities like privilege escalation, lateral movement, and data exfiltration. The core agent, "Demon," written in C and Assembly, uses techniques like indirect syscalls for Nt* APIs, x64 return address spoofing, and sleep obfuscation to bypass defenses.

Havoc offers capabilities such as:

  • Stagers: Lightweight payloads that establish a foothold.
  • Shellcode injectors: Inject shellcode into remote processes, allowing execution without disk traces.
  • Reflective DLL loaders: Bypass traditional antivirus by loading DLLs directly into memory.
  • Custom plugins: Support for credential harvesting, keylogging, and system information gathering.

It supports execution with Beacon Object Files (BOFs), enabling direct memory interaction, and can execute commands using cmd.exe and powershell.exe and is capable of deploying additional payloads to infected systems. Havoc employs advanced evasion techniques, such as process injection and anti-VM/sandbox checks.

For persistence, Havoc can modify system settings, create scheduled tasks, or alter startup configurations, ensuring continued control over compromised systems.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Havoc malware distribution methods

Havoc malware is distributed through a variety of methods that are commonly seen in advanced cyber threats:

  • Phishing emails: Havoc can be delivered via phishing campaigns, where malicious attachments or links are included in seemingly legitimate emails. These attachments often contain malicious macros or scripts that launch the malware once opened by the victim.
  • Malicious downloads: Attackers may trick users into downloading Havoc through fake software updates, cracked software, or malicious files hosted on compromised websites. These files may appear harmless but execute the malware when run.
  • Exploitation of vulnerabilities: Havoc can be deployed by exploiting known software vulnerabilities in operating systems or third-party applications, allowing attackers to gain access to systems remotely.
  • Malvertising: Havoc could be spread via malicious advertisements that redirect users to compromised or malicious websites where the malware is downloaded.

Gathering Threat Intelligence on Havoc Malware

To collect the latest intelligence on Havoc malware, utilize Threat Intelligence Lookup.

This service allows you to access a vast database with insights from millions of malware analysis sessions in the ANY.RUN sandbox. You can customize your search using over 40 different parameters, such as IP addresses, file names, command line artifacts, and process indicators, to find relevant details on Havoc and its behavior.

Havoc in TI Lookup ANY.RUN Search results for Havoc in Threat Intelligence Lookup

For example, by searching for Havoc's threat name (threatName:"Havoc"), you can uncover related samples and sandbox analysis results. This helps security professionals stay up to date on malware's evolution and techniques.

Start exploring these capabilities with a 14-day free trial of Threat Intelligence Lookup, alongside the ANY.RUN sandbox for deep, real-time analysis.

Conclusion

Havoc poses a significant threat due to its advanced evasion techniques, process manipulation, and ability to execute malicious payloads, making it highly dangerous for businesses. To protect against such threats, it’s important to carry out proactive malware analysis of suspicious files and URLs.

ANY.RUN provides real-time threat detection, allowing users to explore malware behavior, gather detailed reports on malware, such as Havoc.

Sign up for a free ANY.RUN account today and start analyzing threats in real-time!

HAVE A LOOK AT

MetaStealer screenshot
MetaStealer
metastealer
MetaStealer is an info-stealing malware primarily targeting sensitive data like login credentials, payment details, and browser history. It typically infects systems via phishing emails or malicious downloads and can exfiltrate data to a command and control (C2) server. MetaStealer is known for its stealthy techniques, including evasion and persistence mechanisms, which make it difficult to detect. This malware has been actively used in various cyberattacks, particularly for financial theft and credential harvesting from individuals and organizations.
Read More
Cactus Ransomware screenshot
Cactus ransomware-as-a-service (RaaS) was first caught in March 2023 targeting corporate networks. It became known for its self-encrypting payload and double extortion tactics. Cactus primarily targets large enterprises across industries in finance, manufacturing, IT, and healthcare. It is known for using custom encryption techniques, remote access tools, and penetration testing frameworks to maximize damage.
Read More
Botnet screenshot
Botnet
botnet
A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More
SSLoad screenshot
SSLoad
ssload
SSLoad is a malicious loader or downloader that is used to infiltrate target systems through phishing emails, perform reconnaissance and transmit it back to its operators delivering malicious payloads. To avoid detection, SSLoad employs various encryption methods and delivery techniques highlighting its versatile nature and complexity. It is believed to be a part of Malware-as-a-Service (MaaS) operation given its diverse delivery methods and implemented techniques.
Read More
WannaCry screenshot
WannaCry
wannacry ransomware
WannaCry is a famous Ransomware that utilizes the EternalBlue exploit. This malware is known for infecting at least 200,000 computers worldwide and it continues to be an active and dangerous threat.
Read More