We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:Win32/Seheq!rfn
Aliases: No associated aliases
Summary
Trojan:Win32/Seheq!rfn is a high-risk ransomware family distributed under a ransomware-as-a-service model, allowing threat actors to deploy it in targeted network intrusions. Seheq first appeared in mid-2023 and is written in Go, a design choice that grants threat actors cross-platform compatibility for targeting Windows, Linux, and virtualized server environments with minimal code changes. Its core function is unauthorized data encryption followed by a cryptocurrency ransom demand, but it also embeds extensive backdoor capabilities that support reconnaissance, data staging, and long-term persistence within compromised infrastructures.
The evolution of Seheq reflects a broader trend of modular ransomware development, with the malware transitioning through distinct branding iterations before integrating into a larger threat actor ecosystem. Its technical maturity is evident in the multi-stage attack chain, which typically begins with exploitation of unpatched internet-facing applications or targeted phishing campaigns. Once deployed, Seheq employs advanced process manipulation and defense evasion techniques to deactivate security controls, move laterally across networks, and maximize encryption impact before detection.
- Disconnect affected devices from the network immediately by removing Ethernet cables and deactivating wireless interfaces to prevent further communication and lateral movement.
- For virtualized environments, shut down infected virtual machines or disconnect their network interfaces through the management console.
- Use advanced process analysis tools to identify and terminate suspicious processes, focusing on instances of command shells with encoded arguments, the rgb9rast.exe process running from temporary directories, and any process from temporary folders with high file handle counts in user document locations.
- Restart systems in Safe Mode if malware installs persistence.
- Run full system scans using updated security tools such as Microsoft Safety Scanner to remove core malicious files and secondary payloads.
- Audit system persistence points to delete unauthorized registry run entries and scheduled tasks pointing to suspicious binaries.
- Remove any malicious group policy objects from domain controllers to prevent reinfection upon policy refresh.
- Restore data from offline backups that were not connected during the infection, verifying backup integrity before restoration.
- Conduct forensic analysis to identify the initial entry point and close vulnerabilities.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.