A sophisticated Iranian-backed ransomware operation has emerged as a significant threat to Western organizations, utilizing advanced PowerShell techniques to bypass Windows security systems.
Pay2Key.I2P, linked to the notorious Fox Kitten APT group, has rapidly expanded since its February 2025 debut, collecting over $4 million in ransom payments within just four months of operation.
Advanced Evasion Through Dual-Format Scripts
The Pay2Key.I2P ransomware employs a particularly sophisticated delivery mechanism centered around a dual-interpretable script that functions as both a CMD batch file and a PowerShell script simultaneously.
This technical innovation allows the malware to execute initial setup commands through CMD before seamlessly transitioning to PowerShell for advanced evasion techniques.
The attack chain begins with a 7-Zip Self-Extracting archive containing an obfuscated setup.cmd script. When executed, the script performs XOR decryption using a rolling key mechanism to decode embedded PowerShell payloads.
The decoded payload immediately creates a critical Windows Defender exclusion for all executable files using the command Add-MpPreference -ExclusionExtension ".exe", effectively creating a blind spot for the entire infection chain without triggering Microsoft’s anti-tampering mechanisms.
The malware further enhances its stealth capabilities by extracting and executing NoDefender, a tool disguised as the legitimate Windows component “powrprof.exe.”
This component performs registry and policy tampering to altogether disable Microsoft Defender, creating a second layer of antivirus bypass protection.
Commercial-Grade Protection and Geopolitical Motivations
What sets Pay2Key.I2P apart from typical ransomware operations is its use of Themida, a commercial-grade software protector rarely seen in commodity malware due to its high cost.
This protection makes reverse engineering and analysis extremely difficult, demonstrating the group’s substantial financial resources and technical sophistication.
The ransomware-as-a-service operation explicitly targets supporters of Iranian geopolitical objectives, offering an increased 80% profit share to affiliates engaged in attacks against “enemies of Iran.”

This ideological component distinguishes the campaign from purely profit-driven cybercrime, positioning it as a tool of state-sponsored cyber warfare.
Recent updates to the platform include Linux-targeting capabilities and enhanced anti-analysis features, such as registry checks to detect sandbox environments.
The group has demonstrated remarkable success with over 51 successful ransom payouts, with individual operators reportedly earning up to $100,000 in profits.
The operation’s strategic marketing across Russian and Chinese darknet forums, combined with a coordinated presence on social media platforms since January 2025, indicates careful planning and a professional approach to recruitment and operations.
This level of organization, coupled with the group’s technical capabilities and geopolitical motivations, represents a significant evolution in the ransomware threat landscape targeting Western infrastructure.
Indicators of Compromise (IOCs)
| Component | SHA256 |
| 7zip SFX Payload (Pay2Key) | 65BE56F46B2AA6BB64B9E560A083A77A80A1B5A459BCBA8D385AA62F8E7B153F |
| E237CF378E2848F687A494AB67FAF9E7EC784D00090CD598A9F1E3291C97181F | |
| 242FA471582C2F37C17717DC260CB108584C44E86B8831382F7B2F5FC63AEB6B | |
| 7336B865F232F7FCCB9B85524D5EBDC444344DE363F77E1B1C3EAEEB3428E1A5 | |
| 1D0EC8E34703A7589533462BE62C020004CFE0F7B20204F9E6C79B84CBFAFC9B | |
| D61A55D368A1DCF570F633C7A23AE12361749C2D7000178DD9E353528C325907 | |
| 17FC4DF8EF9A92C972684CBA707C3976B91BCD7F0251F42F1B63E4DE0E688D6C | |
| B64305852DDB317B7839B39DB602FCDDA60E7658F391FF4BA52FCE4DBCA89089 | |
| setup.cmd – Setup file | 188C215FA32A445D7FFA90DC51C58BDDCD62A714A8F6EAC89B92574C349BF901 |
| F947771556E0A0D900B21DE6A37ABD04C1D2E0E84D0062F61C49D792FFEDEEC5 |





