Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
This intelligence report details a sophisticated cyber intrusion with links to three major ransomware groups: Play, RansomHub, and DragonForce. The attack began with a malicious file impersonating DeskSoft's EarthTime application, which deployed SectopRAT malware. The threat actors used various tools for reconnaissance, lateral movement, and data exfiltration, including SystemBC, Betruger backdoor, AdFind, SharpHound, and Grixba. They leveraged RDP and Impacket's wmiexec for lateral movement, and used WinRAR and WinSCP for data collection and exfiltration. The intrusion lasted six days before the threat actors were evicted, showcasing a range of advanced persistent threat techniques and highlighting the blurred lines between different ransomware operations.
AI Analysis
Technical Summary
This intelligence report describes a sophisticated cyber intrusion linked to three prominent ransomware groups: Play, RansomHub, and DragonForce. The attack commenced with a malicious file masquerading as DeskSoft's EarthTime application, which deployed the SectopRAT malware. SectopRAT is known for its capabilities in reconnaissance and persistence. The threat actors employed a suite of tools to facilitate various stages of the attack lifecycle: SystemBC and Betruger backdoor for maintaining access and command and control; AdFind and SharpHound for network reconnaissance and enumeration; and Grixba for additional post-exploitation activities. Lateral movement was achieved using Remote Desktop Protocol (RDP) and Impacket's wmiexec utility, enabling the attackers to execute commands remotely and move across the network stealthily. For data collection and exfiltration, the attackers used legitimate tools such as WinRAR for archiving data and WinSCP for secure file transfer, which helps evade detection by blending malicious activity with normal administrative operations. The intrusion persisted for six days before the attackers were removed, demonstrating advanced persistent threat (APT) tactics and operational security. The involvement of multiple ransomware gangs indicates a possible collaboration or shared infrastructure, blurring traditional lines between distinct ransomware operations. The attack leveraged numerous MITRE ATT&CK techniques, including T1053.005 (Scheduled Task/Job: Scheduled Task), T1560.001 (Archive Collected Data: Archive via Utility), T1087.002 (Account Discovery: Domain Account), T1204.002 (User Execution: Malicious File), T1566.002 and T1566.001 (Phishing), T1036 (Masquerading), T1136.001 (Create Account: Local Account), T1090 (Proxy), T1072 (Software Deployment Tools), T1059.001 (Command and Scripting Interpreter: PowerShell), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder), T1048 (Exfiltration Over Alternative Protocol), T1562.001 (Impair Defenses: Disable or Modify Tools), T1027 (Obfuscated Files or Information), T1570 (Lateral Tool Transfer), T1046 (Network Service Scanning), T1021.001 (Remote Services: Remote Desktop Protocol), T1003.006 (OS Credential Dumping: Security Account Manager), and T1078.003 (Valid Accounts: Local Accounts). This complex attack chain underscores the high level of coordination and technical expertise involved, posing significant challenges for detection and response.
Potential Impact
For European organizations, this threat poses substantial risks to confidentiality, integrity, and availability of critical systems and data. The use of legitimate administrative tools for lateral movement and data exfiltration complicates detection, increasing the likelihood of prolonged undetected presence within networks. Data exfiltration can lead to exposure of sensitive personal data, intellectual property, and strategic business information, potentially resulting in regulatory penalties under GDPR and reputational damage. The collaboration among multiple ransomware gangs suggests a higher probability of follow-up ransomware deployment, which could disrupt business operations, cause financial losses, and impact supply chains. Given the advanced persistent nature of the intrusion, recovery efforts may be prolonged and costly. The threat actors’ ability to create local accounts and disable defenses further exacerbates the risk by enabling sustained access and evasion of security controls. European sectors with critical infrastructure, finance, healthcare, and manufacturing are particularly vulnerable due to their reliance on interconnected systems and the value of their data to ransomware operators.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the tactics observed in this intrusion. Specific recommendations include: 1) Enforce strict application whitelisting and verify digital signatures to prevent execution of masqueraded files like the fake EarthTime application. 2) Harden RDP access by disabling it where unnecessary, enforcing multi-factor authentication (MFA), and restricting access via VPN or jump hosts with strict logging. 3) Monitor and restrict the use of administrative tools such as Impacket utilities, PowerShell, WinRAR, and WinSCP, employing application control and behavioral analytics to detect anomalous usage. 4) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying lateral movement techniques and credential dumping activities. 5) Conduct regular network segmentation to limit lateral movement opportunities and isolate critical assets. 6) Implement continuous monitoring for creation of new local accounts and changes to autostart registry keys. 7) Establish robust data loss prevention (DLP) controls to detect and block unauthorized data archiving and exfiltration attempts. 8) Conduct frequent threat hunting exercises focusing on indicators of compromise related to SectopRAT, SystemBC, Betruger, and Grixba malware. 9) Maintain up-to-date incident response plans that include procedures for rapid eviction of persistent threat actors. 10) Educate users on phishing risks and enforce strict email filtering to reduce initial infection vectors. These targeted measures go beyond generic advice by addressing the specific tools and techniques employed in this multi-gang intrusion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
Indicators of Compromise
- ip: 45.141.87.55
- hash: 12011c44955fd6631113f68a99447515
- hash: 27f7186499bc8d10e51d17d3d6697bc5
- hash: 5675a7773f6d3224bfefdc01745f8411
- hash: 71f703024c3d3bfc409f66bb61f971a0
- hash: 829a9dfd2cdcf50519a1cec1f529854b
- hash: 88df27b6e794e3fd5f93f28b1ca1d3d0
- hash: 95c96de7dcb5a643559ac66045559cc9
- hash: abb2a6a0f771ab20ce2037d2c4ef5783
- hash: c6f92d1801d7d212282a6dd8f11b44fe
- hash: e963d598a86c5ee428a2eefa34d1ffbb
- hash: 142294249feb536e0edbe6e2de3eb3c3415ecf39
- hash: 2114d655805f465d11b720830d150c145039bcd4
- hash: 4f4f8cf0f9b47d0ad95d159201fe7e72fbc8448d
- hash: 52332ce16ee0c393b8eea6e71863ad41e3caeafd
- hash: 5bf41754bfb3a18611b2a02f7f385960ed24f8e1
- hash: 68b6d0cc1430e2d4f70e2ba5026d1c4847324269
- hash: ac0fcbc148e45e172c9be0acf9c307186f898803
- hash: c0e5e4b5fcbd0a30b042e602d99a6ee81ad5d8d7
- hash: d15d45d9d9a8ef7a9f048d74b386f620f3b82576
- hash: f24fc14f39c160b54dc3b2fbd1eba605ec0eb04f
- hash: 18f0898d595ec054d13b02915fb7d3636f65b8e53c0c66b3c7ee3b6fc37d3566
- hash: 6f9326224e6047458e692cd27aeb1054b9381c67aaf2fe238dbebfbc916c4b33
- hash: a4bc6bebabb52ed9816987b77ebae6ef70e174533a643aea6265bdf1ed9b8952
- hash: a7240d8a7aee872c08b915a58976a1ddee2ff5a8a679f78ec1c7cf528f40deed
- hash: ae7c31d4547dd293ba3fd3982b715c65d731ee07a9c1cc402234d8705c01dfca
- hash: aeaf7cc7364a44b381af9f317fe6f78c2717217800b93bee8839ab3e56233254
- hash: bcff246f0739ed98f8aa615d256e7e00bc1cb24c8cabaea609b25c3f050c7805
- hash: c92c158d7c37fea795114fa6491fe5f145ad2f8c08776b18ae79db811e8e36a3
- hash: e1521e077079032df974c7ae39e4737cdb4f05c6ded677ed5446167466eeb899
- hash: f8810179ab033a9b79cd7006c1a74fbcde6ed0451c92fbb8c7ce15b52499353a
- ip: 80.78.28.149
- domain: delete.me
- domain: 504e1c95.host.njalla.net
- domain: 504ec1c95.host.njalla.net
Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
Description
This intelligence report details a sophisticated cyber intrusion with links to three major ransomware groups: Play, RansomHub, and DragonForce. The attack began with a malicious file impersonating DeskSoft's EarthTime application, which deployed SectopRAT malware. The threat actors used various tools for reconnaissance, lateral movement, and data exfiltration, including SystemBC, Betruger backdoor, AdFind, SharpHound, and Grixba. They leveraged RDP and Impacket's wmiexec for lateral movement, and used WinRAR and WinSCP for data collection and exfiltration. The intrusion lasted six days before the threat actors were evicted, showcasing a range of advanced persistent threat techniques and highlighting the blurred lines between different ransomware operations.
AI-Powered Analysis
Technical Analysis
This intelligence report describes a sophisticated cyber intrusion linked to three prominent ransomware groups: Play, RansomHub, and DragonForce. The attack commenced with a malicious file masquerading as DeskSoft's EarthTime application, which deployed the SectopRAT malware. SectopRAT is known for its capabilities in reconnaissance and persistence. The threat actors employed a suite of tools to facilitate various stages of the attack lifecycle: SystemBC and Betruger backdoor for maintaining access and command and control; AdFind and SharpHound for network reconnaissance and enumeration; and Grixba for additional post-exploitation activities. Lateral movement was achieved using Remote Desktop Protocol (RDP) and Impacket's wmiexec utility, enabling the attackers to execute commands remotely and move across the network stealthily. For data collection and exfiltration, the attackers used legitimate tools such as WinRAR for archiving data and WinSCP for secure file transfer, which helps evade detection by blending malicious activity with normal administrative operations. The intrusion persisted for six days before the attackers were removed, demonstrating advanced persistent threat (APT) tactics and operational security. The involvement of multiple ransomware gangs indicates a possible collaboration or shared infrastructure, blurring traditional lines between distinct ransomware operations. The attack leveraged numerous MITRE ATT&CK techniques, including T1053.005 (Scheduled Task/Job: Scheduled Task), T1560.001 (Archive Collected Data: Archive via Utility), T1087.002 (Account Discovery: Domain Account), T1204.002 (User Execution: Malicious File), T1566.002 and T1566.001 (Phishing), T1036 (Masquerading), T1136.001 (Create Account: Local Account), T1090 (Proxy), T1072 (Software Deployment Tools), T1059.001 (Command and Scripting Interpreter: PowerShell), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder), T1048 (Exfiltration Over Alternative Protocol), T1562.001 (Impair Defenses: Disable or Modify Tools), T1027 (Obfuscated Files or Information), T1570 (Lateral Tool Transfer), T1046 (Network Service Scanning), T1021.001 (Remote Services: Remote Desktop Protocol), T1003.006 (OS Credential Dumping: Security Account Manager), and T1078.003 (Valid Accounts: Local Accounts). This complex attack chain underscores the high level of coordination and technical expertise involved, posing significant challenges for detection and response.
Potential Impact
For European organizations, this threat poses substantial risks to confidentiality, integrity, and availability of critical systems and data. The use of legitimate administrative tools for lateral movement and data exfiltration complicates detection, increasing the likelihood of prolonged undetected presence within networks. Data exfiltration can lead to exposure of sensitive personal data, intellectual property, and strategic business information, potentially resulting in regulatory penalties under GDPR and reputational damage. The collaboration among multiple ransomware gangs suggests a higher probability of follow-up ransomware deployment, which could disrupt business operations, cause financial losses, and impact supply chains. Given the advanced persistent nature of the intrusion, recovery efforts may be prolonged and costly. The threat actors’ ability to create local accounts and disable defenses further exacerbates the risk by enabling sustained access and evasion of security controls. European sectors with critical infrastructure, finance, healthcare, and manufacturing are particularly vulnerable due to their reliance on interconnected systems and the value of their data to ransomware operators.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the tactics observed in this intrusion. Specific recommendations include: 1) Enforce strict application whitelisting and verify digital signatures to prevent execution of masqueraded files like the fake EarthTime application. 2) Harden RDP access by disabling it where unnecessary, enforcing multi-factor authentication (MFA), and restricting access via VPN or jump hosts with strict logging. 3) Monitor and restrict the use of administrative tools such as Impacket utilities, PowerShell, WinRAR, and WinSCP, employing application control and behavioral analytics to detect anomalous usage. 4) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying lateral movement techniques and credential dumping activities. 5) Conduct regular network segmentation to limit lateral movement opportunities and isolate critical assets. 6) Implement continuous monitoring for creation of new local accounts and changes to autostart registry keys. 7) Establish robust data loss prevention (DLP) controls to detect and block unauthorized data archiving and exfiltration attempts. 8) Conduct frequent threat hunting exercises focusing on indicators of compromise related to SectopRAT, SystemBC, Betruger, and Grixba malware. 9) Maintain up-to-date incident response plans that include procedures for rapid eviction of persistent threat actors. 10) Educate users on phishing risks and enforce strict email filtering to reduce initial infection vectors. These targeted measures go beyond generic advice by addressing the specific tools and techniques employed in this multi-gang intrusion.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://thedfirreport.com/2025/09/08/blurring-the-lines-intrusion-shows-connection-with-three-major-ransomware-gangs"]
- Adversary
- null
- Pulse Id
- 68bf4c4a523b7dcd88cf5771
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip45.141.87.55 | — | |
ip80.78.28.149 | — |
Hash
Value | Description | Copy |
---|---|---|
hash12011c44955fd6631113f68a99447515 | — | |
hash27f7186499bc8d10e51d17d3d6697bc5 | — | |
hash5675a7773f6d3224bfefdc01745f8411 | — | |
hash71f703024c3d3bfc409f66bb61f971a0 | — | |
hash829a9dfd2cdcf50519a1cec1f529854b | — | |
hash88df27b6e794e3fd5f93f28b1ca1d3d0 | — | |
hash95c96de7dcb5a643559ac66045559cc9 | — | |
hashabb2a6a0f771ab20ce2037d2c4ef5783 | — | |
hashc6f92d1801d7d212282a6dd8f11b44fe | — | |
hashe963d598a86c5ee428a2eefa34d1ffbb | — | |
hash142294249feb536e0edbe6e2de3eb3c3415ecf39 | — | |
hash2114d655805f465d11b720830d150c145039bcd4 | — | |
hash4f4f8cf0f9b47d0ad95d159201fe7e72fbc8448d | — | |
hash52332ce16ee0c393b8eea6e71863ad41e3caeafd | — | |
hash5bf41754bfb3a18611b2a02f7f385960ed24f8e1 | — | |
hash68b6d0cc1430e2d4f70e2ba5026d1c4847324269 | — | |
hashac0fcbc148e45e172c9be0acf9c307186f898803 | — | |
hashc0e5e4b5fcbd0a30b042e602d99a6ee81ad5d8d7 | — | |
hashd15d45d9d9a8ef7a9f048d74b386f620f3b82576 | — | |
hashf24fc14f39c160b54dc3b2fbd1eba605ec0eb04f | — | |
hash18f0898d595ec054d13b02915fb7d3636f65b8e53c0c66b3c7ee3b6fc37d3566 | — | |
hash6f9326224e6047458e692cd27aeb1054b9381c67aaf2fe238dbebfbc916c4b33 | — | |
hasha4bc6bebabb52ed9816987b77ebae6ef70e174533a643aea6265bdf1ed9b8952 | — | |
hasha7240d8a7aee872c08b915a58976a1ddee2ff5a8a679f78ec1c7cf528f40deed | — | |
hashae7c31d4547dd293ba3fd3982b715c65d731ee07a9c1cc402234d8705c01dfca | — | |
hashaeaf7cc7364a44b381af9f317fe6f78c2717217800b93bee8839ab3e56233254 | — | |
hashbcff246f0739ed98f8aa615d256e7e00bc1cb24c8cabaea609b25c3f050c7805 | — | |
hashc92c158d7c37fea795114fa6491fe5f145ad2f8c08776b18ae79db811e8e36a3 | — | |
hashe1521e077079032df974c7ae39e4737cdb4f05c6ded677ed5446167466eeb899 | — | |
hashf8810179ab033a9b79cd7006c1a74fbcde6ed0451c92fbb8c7ce15b52499353a | — |
Domain
Value | Description | Copy |
---|---|---|
domaindelete.me | — | |
domain504e1c95.host.njalla.net | — | |
domain504ec1c95.host.njalla.net | — |
Threat ID: 68c0a4a69ed239a66bad4d4d
Added to database: 9/9/2025, 10:05:26 PM
Last enriched: 9/9/2025, 10:21:02 PM
Last updated: 9/10/2025, 3:08:04 AM
Views: 4
Related Threats
The Rise of RatOn: From NFC heists to remote control and ATS
MediumUnmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed
MediumUS charges admin of LockerGoga, MegaCortex, Nefilim ransomware
HighBlurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
MediumMostereRAT Deployed AnyDesk/TightVNC for Covert Full Access
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.