Security researchers discover dangerous malware that's small, fast, can work locally, and doesn't need a master command - here's what you need to know

Neon letters spelling RANSOMWARE set against a dark background with red and blue circuitry
Image Credit: Pixabay (Image credit: Getty Images)

  • Mamona executes quietly, never touches the internet, and erases itself, making it hard to detect
  • A three-second delay followed by self-deletion helps Mamona evade detection rules
  • Ransomware behavior blends in with normal activity, delaying security team response

Security researchers are tracking Mamona, a newly identified ransomware strain that stands out for its stripped-down design and quiet, local execution.

Experts from Wazuh say this ransomware avoids the usual reliance on command-and-control servers, opting instead for a self-contained approach that slips past tools dependent on network traffic analysis.

It is executed locally on a Windows system as a standalone binary file, and this offline behavior exposes a blind spot in conventional defenses, forcing a rethink of how even the best antivirus and detection systems should function when there is no network.

Self-deletion and evasion tactics complicate detection

Upon execution, it initiates a three-second delay using a modified ping command, cmd.exe /C ping 127.0.0.7 -n 3 > Nul & Del /f /q, and then self-deletes.

This self-deletion reduces forensic artifacts, making it harder for investigators to trace or analyze the malware after it has run.

Instead of using the popular 127.0.0.1, it uses 127.0.0.7, which helps it to bypass detection rules.

This method evades simple detection patterns and avoids leaving digital traces that traditional file-based scanners might flag.

It drops a ransom note titled README.HAes.txt and renames affected files with the .HAes extension, signaling a successful encryption operation.

Wazuh warns that the malware’s “plug-and-play nature lowers the barrier for cybercriminals, contributing to the broader commoditization of ransomware.”

This shift suggests a need for greater scrutiny of what qualifies as the best ransomware protection, especially when such threats no longer need remote control infrastructure to cause damage.

Wazuh’s approach to detecting Mamona involves integrating Sysmon for log capture and using custom rules to flag specific behaviors such as ransom note creation and ping-based delays.

Rule 100901 targets the creation of the README.HAes.txt file, while Rule 100902 confirms the presence of ransomware when both ransom note activity and the delay/self-delete sequence appear together.

These rules help identify indicators that might otherwise escape more general monitoring setups.

To respond to Mamona before damage is done, Wazuh uses YARA rules and a real-time File Integrity Monitoring (FIM) system.

When a suspicious file is added or modified, especially in a user's Downloads folder, the Wazuh Active Response module triggers a YARA scan.

This immediate remediation mimics what one might expect from the best DDoS protection strategies, acting fast before deeper compromise occurs.

As ransomware continues to evolve, so too must the best antivirus solutions, and while no single tool guarantees perfect protection, solutions with modular response give defenders a flexible, evolving edge.

You might also like

Efosa Udinmwen
Freelance Journalist

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.