Skip to main content

Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs

Medium
Published: Mon Sep 08 2025 (09/08/2025, 21:36:10 UTC)
Source: AlienVault OTX General

Description

This intelligence report details a sophisticated cyber intrusion with links to three major ransomware groups: Play, RansomHub, and DragonForce. The attack began with a malicious file impersonating DeskSoft's EarthTime application, which deployed SectopRAT malware. The threat actors used various tools for reconnaissance, lateral movement, and data exfiltration, including SystemBC, Betruger backdoor, AdFind, SharpHound, and Grixba. They leveraged RDP and Impacket's wmiexec for lateral movement, and used WinRAR and WinSCP for data collection and exfiltration. The intrusion lasted six days before the threat actors were evicted, showcasing a range of advanced persistent threat techniques and highlighting the blurred lines between different ransomware operations.

AI-Powered Analysis

AILast updated: 09/09/2025, 22:21:02 UTC

Technical Analysis

This intelligence report describes a sophisticated cyber intrusion linked to three prominent ransomware groups: Play, RansomHub, and DragonForce. The attack commenced with a malicious file masquerading as DeskSoft's EarthTime application, which deployed the SectopRAT malware. SectopRAT is known for its capabilities in reconnaissance and persistence. The threat actors employed a suite of tools to facilitate various stages of the attack lifecycle: SystemBC and Betruger backdoor for maintaining access and command and control; AdFind and SharpHound for network reconnaissance and enumeration; and Grixba for additional post-exploitation activities. Lateral movement was achieved using Remote Desktop Protocol (RDP) and Impacket's wmiexec utility, enabling the attackers to execute commands remotely and move across the network stealthily. For data collection and exfiltration, the attackers used legitimate tools such as WinRAR for archiving data and WinSCP for secure file transfer, which helps evade detection by blending malicious activity with normal administrative operations. The intrusion persisted for six days before the attackers were removed, demonstrating advanced persistent threat (APT) tactics and operational security. The involvement of multiple ransomware gangs indicates a possible collaboration or shared infrastructure, blurring traditional lines between distinct ransomware operations. The attack leveraged numerous MITRE ATT&CK techniques, including T1053.005 (Scheduled Task/Job: Scheduled Task), T1560.001 (Archive Collected Data: Archive via Utility), T1087.002 (Account Discovery: Domain Account), T1204.002 (User Execution: Malicious File), T1566.002 and T1566.001 (Phishing), T1036 (Masquerading), T1136.001 (Create Account: Local Account), T1090 (Proxy), T1072 (Software Deployment Tools), T1059.001 (Command and Scripting Interpreter: PowerShell), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder), T1048 (Exfiltration Over Alternative Protocol), T1562.001 (Impair Defenses: Disable or Modify Tools), T1027 (Obfuscated Files or Information), T1570 (Lateral Tool Transfer), T1046 (Network Service Scanning), T1021.001 (Remote Services: Remote Desktop Protocol), T1003.006 (OS Credential Dumping: Security Account Manager), and T1078.003 (Valid Accounts: Local Accounts). This complex attack chain underscores the high level of coordination and technical expertise involved, posing significant challenges for detection and response.

Potential Impact

For European organizations, this threat poses substantial risks to confidentiality, integrity, and availability of critical systems and data. The use of legitimate administrative tools for lateral movement and data exfiltration complicates detection, increasing the likelihood of prolonged undetected presence within networks. Data exfiltration can lead to exposure of sensitive personal data, intellectual property, and strategic business information, potentially resulting in regulatory penalties under GDPR and reputational damage. The collaboration among multiple ransomware gangs suggests a higher probability of follow-up ransomware deployment, which could disrupt business operations, cause financial losses, and impact supply chains. Given the advanced persistent nature of the intrusion, recovery efforts may be prolonged and costly. The threat actors’ ability to create local accounts and disable defenses further exacerbates the risk by enabling sustained access and evasion of security controls. European sectors with critical infrastructure, finance, healthcare, and manufacturing are particularly vulnerable due to their reliance on interconnected systems and the value of their data to ransomware operators.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to the tactics observed in this intrusion. Specific recommendations include: 1) Enforce strict application whitelisting and verify digital signatures to prevent execution of masqueraded files like the fake EarthTime application. 2) Harden RDP access by disabling it where unnecessary, enforcing multi-factor authentication (MFA), and restricting access via VPN or jump hosts with strict logging. 3) Monitor and restrict the use of administrative tools such as Impacket utilities, PowerShell, WinRAR, and WinSCP, employing application control and behavioral analytics to detect anomalous usage. 4) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying lateral movement techniques and credential dumping activities. 5) Conduct regular network segmentation to limit lateral movement opportunities and isolate critical assets. 6) Implement continuous monitoring for creation of new local accounts and changes to autostart registry keys. 7) Establish robust data loss prevention (DLP) controls to detect and block unauthorized data archiving and exfiltration attempts. 8) Conduct frequent threat hunting exercises focusing on indicators of compromise related to SectopRAT, SystemBC, Betruger, and Grixba malware. 9) Maintain up-to-date incident response plans that include procedures for rapid eviction of persistent threat actors. 10) Educate users on phishing risks and enforce strict email filtering to reduce initial infection vectors. These targeted measures go beyond generic advice by addressing the specific tools and techniques employed in this multi-gang intrusion.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://thedfirreport.com/2025/09/08/blurring-the-lines-intrusion-shows-connection-with-three-major-ransomware-gangs"]
Adversary
null
Pulse Id
68bf4c4a523b7dcd88cf5771
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip45.141.87.55
ip80.78.28.149

Hash

ValueDescriptionCopy
hash12011c44955fd6631113f68a99447515
hash27f7186499bc8d10e51d17d3d6697bc5
hash5675a7773f6d3224bfefdc01745f8411
hash71f703024c3d3bfc409f66bb61f971a0
hash829a9dfd2cdcf50519a1cec1f529854b
hash88df27b6e794e3fd5f93f28b1ca1d3d0
hash95c96de7dcb5a643559ac66045559cc9
hashabb2a6a0f771ab20ce2037d2c4ef5783
hashc6f92d1801d7d212282a6dd8f11b44fe
hashe963d598a86c5ee428a2eefa34d1ffbb
hash142294249feb536e0edbe6e2de3eb3c3415ecf39
hash2114d655805f465d11b720830d150c145039bcd4
hash4f4f8cf0f9b47d0ad95d159201fe7e72fbc8448d
hash52332ce16ee0c393b8eea6e71863ad41e3caeafd
hash5bf41754bfb3a18611b2a02f7f385960ed24f8e1
hash68b6d0cc1430e2d4f70e2ba5026d1c4847324269
hashac0fcbc148e45e172c9be0acf9c307186f898803
hashc0e5e4b5fcbd0a30b042e602d99a6ee81ad5d8d7
hashd15d45d9d9a8ef7a9f048d74b386f620f3b82576
hashf24fc14f39c160b54dc3b2fbd1eba605ec0eb04f
hash18f0898d595ec054d13b02915fb7d3636f65b8e53c0c66b3c7ee3b6fc37d3566
hash6f9326224e6047458e692cd27aeb1054b9381c67aaf2fe238dbebfbc916c4b33
hasha4bc6bebabb52ed9816987b77ebae6ef70e174533a643aea6265bdf1ed9b8952
hasha7240d8a7aee872c08b915a58976a1ddee2ff5a8a679f78ec1c7cf528f40deed
hashae7c31d4547dd293ba3fd3982b715c65d731ee07a9c1cc402234d8705c01dfca
hashaeaf7cc7364a44b381af9f317fe6f78c2717217800b93bee8839ab3e56233254
hashbcff246f0739ed98f8aa615d256e7e00bc1cb24c8cabaea609b25c3f050c7805
hashc92c158d7c37fea795114fa6491fe5f145ad2f8c08776b18ae79db811e8e36a3
hashe1521e077079032df974c7ae39e4737cdb4f05c6ded677ed5446167466eeb899
hashf8810179ab033a9b79cd7006c1a74fbcde6ed0451c92fbb8c7ce15b52499353a

Domain

ValueDescriptionCopy
domaindelete.me
domain504e1c95.host.njalla.net
domain504ec1c95.host.njalla.net

Threat ID: 68c0a4a69ed239a66bad4d4d

Added to database: 9/9/2025, 10:05:26 PM

Last enriched: 9/9/2025, 10:21:02 PM

Last updated: 9/10/2025, 3:08:04 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats