top of page

Inside Shanya: The Packer-as-a-Service Powering Modern Attacks

  • Dec 7, 2025
  • 1 min read

Key Findings:


  • A new packer-as-a-service offering called "Shanya" has been gaining popularity among ransomware groups.

  • Shanya offers features like AMSI bypass, UAC bypass, runtime protection, and anti-VM/sandbox evasion.

  • Early samples of the Shanya crypter contained revealing information about its purpose and development.

  • The Shanya packer has been detected in a wide geographic distribution, with higher prevalence in certain countries like Tunisia and the UAE.

  • The packed executables exhibit techniques to evade detection and analysis.


Background


Near the end of 2024, references to a new offering called "VX Crypt" appeared on underground forums, credited to an entity called "Shanya." The features described, such as AMSI bypass, runtime protection, and anti-VM capabilities, match the characteristics of the packer we have found in various malware samples.


Early Samples and Artifacts


The early samples of the Shanya crypter contained revealing information, such as the executable name "shanya_crypter.exe" and DLL names that included the word "f■ckav," indicating its purpose of bypassing security solutions.


Geographic Distribution


Analysis of Shanya-packed malware samples detected by Sophos shows a wide geographic distribution, with higher prevalence in certain countries like Tunisia and the UAE, as well as clustering in the Shenzhen area of China.


Under the Hood: The Packed Executables


The packed executables created by the Shanya packer exhibit techniques to evade detection and analysis, such as obfuscation, anti-debugging measures, and runtime protection. These features are designed to make the malware more difficult to analyze and detect.


Sources


  • https://news.sophos.com/en-us/2025/12/06/inside-shanya-a-packer-as-a-service-fueling-modern-attacks/

  • https://malware.news/t/inside-shanya-a-packer-as-a-service-fueling-modern-attacks/102354

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page