Blurring The Lines: Intrusion Shows Connection With Three Major Ransomware Gangs

Key Takeaways

  • The intrusion began when a user downloaded and executed a malicious file impersonating DeskSoft’s EarthTime application but instead dropped SectopRAT malware.
  • The threat actor deployed multiple malware families, including SystemBC for proxy tunneling, and later Betruger backdoor for additional capabilities. They leveraged various tools such as AdFind, SharpHound, SoftPerfect NetScan, and GT_NET.exe (Grixba) to map out the environment and perform reconnaissance activities.
  • Lateral movement was primarily accomplished through RDP connections, with additional use of Impacket’s wmiexec. The threat actor moved across multiple systems, including domain controllers, backup servers, and file servers, while maintaining persistence through local account creation and startup folder shortcuts.
  • Data collection and exfiltration were performed using WinRAR to compress targeted file shares containing sensitive business documents, which were then transferred via WinSCP to an FTP server hosted by a cloud provider in clear text.
  • The discovery of Grixba (a reconnaissance tool linked to Play ransomware), a previous NetScan output containing data from a company reportedly compromised by DragonForce ransomware, and the use of the Betruger backdoor suggest that the likely objective of this intrusion was ransomware deployment. Based on these findings, the threat actor behind this intrusion was most likely an affiliate operating across multiple ransomware groups.

This case was originally published as a Threat Brief to customers in March of 2025. Interested in pricing or have questions about our services? Contact us

The DFIR Report Services

    • Private Threat Briefs: 20+ private DFIR reports annually.
    • Threat Feed: Focuses on tracking Command and Control frameworks like Cobalt Strike, Metasploit, Sliver, etc.
    • All Intel: Includes everything from Private Threat Briefs and Threat Feed, plus private events, Threat Actor Insights reports, long-term tracking, data clustering, and other curated intel.
    • Private Sigma Ruleset: Features 170+ Sigma rules derived from 50+ cases, mapped to ATT&CK with test examples.
    • DFIR Labs: Offers cloud-based, hands-on learning experiences, using real data, from real intrusions. Interactive labs are available with different difficulty levels and can be accessed on-demand, accommodating various learning speeds.

    Contact us today for pricing or a demo!

Table of Contents:

Case Summary

The intrusion began in September 2024 with a download of a malicious file mimicking the EarthTime application by DeskSoft. Upon execution, SectopRAT was deployed which opened a connection to its command and control (C2) infrastructure. The threat actor established persistence by relocating the malicious file and placing a shortcut in the Startup folder, configured to trigger on user logon. They further elevated access by creating a new local account and assigning it local administrative privileges.

Soon after establishing the initial access, the malware deployed SystemBC. They then accessed the beachhead host via RDP using the newly created local account and executed discovery commands. At this stage, the threat actor completed a DCSync attack against a domain controller. They then followed up by connecting to the domain controller over RDP with the built-in Administrator account and used PsExec to execute SystemBC with SYSTEM privileges on the host. Using their existing proxy tunnel, the threat actor once again used RDP to connect to hosts in the environment. While on the domain controller, we observed the threat actor using Windows utilities, such as ipconfig and nltest, to perform an enumeration.

Over the next few hours, the threat actor connected to several servers using RDP and deployed SystemBC across the environment. On a backup server, they executed a PowerShell script designed to retrieve Veeam credentials.

On the second day, the threat actor used RDP to move laterally to the file server where they dropped a WinRAR executable and archived specific file shares. They transferred the resulting archives to a U.S. based cloud host over unencrypted FTP using WinSCP. This enabled the retrieval of credentials, among other details, during traffic analysis. The threat actor also resumed discovery activity with the use of Grixba, a tool associated with Play Ransomware that uses WMI and WinRM to discover users and systems across the network, which was executed from both the domain controller and a backup server. They carried out further discovery activity with the use of AdFind for AD queries, PowerShell Cmdlets to collect host data, SharpHound for directory mapping, and SoftPerfect NetScan to scan remote hosts.

On the sixth day of the intrusion, SectopRAT spawned a new payload on the beachhead host. The new payload executed was Betruger, a multi-function backdoor. The threat actor also used wmiexec to enumerate remote hosts through various reconnaissance commands executed on the domain controller.

Throughout the intrusion, the threat actor used multiple defense evasion techniques, including process injection, timestomping, disabling Microsoft Defender’s protections, and deploying binaries with spoofed metadata to disguise themselves as legitimate cybersecurity tools such as SentinelOne and Avast Antivirus.

While no final actions were observed during this intrusion before the threat actor was evicted, the evidence shows links to three different ransomware operations. The Grixba tooling has been associated with the Play ransomware group. Similarly the Betruger backdoor has been linked to Ransomhub affiliated threat actors. And finally with opsec failures, the threat actor dropped the results of prior netscan discovery that appeared to contain data from a company that had been posted to the DragonForce Ransomware leak site prior in 2024. With each of these indicators we assess this threat actor was active as an affiliate for multiple ransomware groups.

Analysts

Analysis and reporting completed by r3nzsec, EncapsulateJ, rkonicekr, and Adam Rowe.

Initial Access

e55f5c1744963933bb998f5b8043e1266caca271329f587ab9cc9c510b43ab54

The intrusion began when a user downloaded and executed an executable impersonating DeskSoft’s EarthTime application. This binary initiated a chain of execution leading to the deployment of SecTopRat, a .NET-based remote access trojan (RAT) with information-stealing capabilities.

e8b222361c63ae7c7d3bebcdf09b734c165352a09f4962ba96904128f6d86c25

While investigating the connection between this malware and the legitimate software, we identified a vulnerability in the installer. Although we did not observe the threat actor exploiting this flaw, it may explain why the software was targeted. The EarthTime application has a list of resource files that it will copy into its install location.

815b1c7aac8943147062652f5971ac7b0a55aa7d08b5a6c4b8950edf2ef77cc5

This includes the EarthTime.exe executable file. When the installer is run, before it unpacks the resources from inside the installer package, It first looks for these resources in the current directory:

d1ccb81be261b96963ae4421b8bb5a9a36f13c7f884a10a1f8322bdf339e34d3

Meaning that if any of the files listed in the resource are found, it will copy that file instead of the one packaged in the installer. For example, we created our own Cities.txt file, and on installation, we confirmed our modified file was copied to the installed location:

c34b08cb67c36476c71f815d3714345f085d0ccb667be7bcd46b81b5593544c8

This behavior matches CWE-427 – Uncontrolled Search Path Element (https://cwe.mitre.org/data/definitions/427.html)

c3f85bde148f85287791689fd6e8e71c73bd82255c682ddf9e199ab1af71a93c

We discovered that this vulnerability applies to all software provided by Desksoft.

Execution

EarthTime.exe

The EarthTime.exe binary was executed from the Downloads folder. The parent process was explorer.exe, suggesting it was executed by the victim clicking on the executable. EarthTime.exe appeared to be mimicking the legitimate EarthTime application by DeskSoft. The real EarthTime is a world clock utility that lets users track multiple time zones and view astronomical data like sunrise and sunset times for different locations. It’s particularly useful for business users and travelers who need to coordinate across time zones.

0f44ce43025b796d069807a662006bf3a458b9dbccc5610c38f9f377980d5b60

This malicious version had been signed with a revoked certificate from “Brave Pragmatic Network Technology Co., Ltd.” – likely an attempt to make it look legitimate to both users and security software. Brave Pragmatic Network Technology Co., Ltd. appears to be a compromised or fraudulent certificate authority that has been observed signing multiple malware samples, with security researchers tracking various malicious executables bearing certificates from this entity.

b98f40899ab7c2842f0a5eca5340c82aa93e3c03427d6432d2ec022949440e80

According to Cert Central lookup database, Brave Pragmatic Network Technology Co., Ltd. is a known malicious signer that has been observed signing SectopRAT samples, with certificates issued by GlobalSign GCC R45 EV CodeSigning CA 2020 and traced to China (CN).

370238788522ccfa0cd0733471407ce1fe23b85223e5ba3a3d6c16464c105729

The choice to impersonate EarthTime makes sense from the threat actor’s perspective, as people are generally more willing to run software they recognize. A file named “EarthTime.exe” is far less suspicious than something with a random or obviously malicious name, making this a classic example of social engineering through software masquerading.

4f934cccc2ce6a9b08965258f9cfdfb6ea8b7a5d283c8b1ccaf0f4fb34b3226b

At the time of writing, the binary is widely recognized as malicious:

300db3152325f624704b2170bf96bc73dcfc5246dc0b1914ff5d13d532bcb3e1

3422a38fe89d626a1f624ba32a4e1f733ed3d06141a316b847bfd0afc364ec9b

EarthTime.exe spawned cmd.exe with no command line arguments. This cmd.exe process went on to spawn MSBuild.exe with the CurrentDirectory set to the user’s downloads folder. MSBuild.exe is a legitimate binary signed by Microsoft, but it is unusual for it to be executed with no command-line arguments. Red Canary has previously observed this activity linked to the SecTopRAT/ArechClient2, a .NET RAT tool, which also inspired the following threat hunting query, which would detect this activity. Process chains where SecTopRat/ArechClient2 has been injected into both cmd.exe and a subsequent msbuild.exe child process have been commonly observed, such as by Red Canary and The DFIR Report.

After injection, the malicious MSBuild.exe process reached out to Pastebin to retrieve its C2 configuration.

e39dcee017247dea7506c461e33e897b6e55fd84c598c036518611a8707c2676

08d3d143c4f2987c359937687f4f1d31f614035ec67c5f246148c4649cd3e767

MSBuild.exe communicated with 45.141.87.55 on ports 9000 and 15647. This traffic triggered the following Suricata rules:

7b2f60f3be7a48434fb1c6356df0c0729e51e5f1451005c4da9a79ccfda90f5f

This SectopRAT IP address was also mentioned by Fox_threatintel on X/Twitter last year (2024) while also mentioning port 9000

a24723d98f4d8204bcc33ad52b20e85f8a647d4b08b28e70c9ba9b5104cbb34f

The same IP address was listed in the IOC section of RussianPanda’s blog detailing The abuse of ITarian RMM by the Dolphin Loader, a malware delivery mechanism that leverages legitimate remote management tools to deploy RATs like SectopRAT.

6228228ddb2fc890cf4737a461a8b87800928d2f871cd20c5d60042474f57693

This MSBuild.exe process then wrote the malicious executable C:\Users\Public\Music\WakeWordEngine.dll . This file write event triggered the following Sigma rules:

• ‘Suspicious Binaries and Scripts in Public Folder’

• ‘Windows Shell/Scripting Application File Write to Suspicious Folder’

WakeWordEngine.dll | conhost.dll

WakeWordEngine.dll is widely recognized as malicious at the time of writing. VirusTotal recognizes the file as conhost.dll:

ce8f79ca1ca01ff0eeb292d558eec9970a28ca24c0e94f3145f862ba4baf032e

In-memory YARA scans identified the DLL as SystemBC, triggering the following signatures:

Rule: ELASTIC_Windows_Trojan_Systembc_C1B58C2FRule: EXT_MAL_SystemBC_Mar22_1Rule: MALPEDIA_Win_Systembc_AutoRule: TELEKOM_SECURITY_Win_Systembc_20220311

This DLL was deployed across multiple compromised servers throughout the intrusion. In most instances, it retained the same filename observed on the initial beachhead system (WakeWordEngine.dll); however, on the domain controller it was renamed to conhost.dll which corresponds to the filename identified in VirusTotal analysis. Across all infected systems, the malware was consistently staged in the C:\Users\Public\Music\ directory and executed via rundll32.exe, calling the exported function ‘Reset’. For instance, we also observe the threat actor executing the malicious DLL remotely via PsExec.

9e38c2541bfe90cf8deec64f69419a5a2c3721174410e897b097554668158843

WakeWordEngine.dll/conhost.dll processes were observed communicating with 149.28.101.219 over port 443. OSINT data identifies this IP address as associated with SystemBC infrastructure and shows it resolves to the following domains:

880c89c612d2fac021bd5722b0efd745440a8b554d6374601e525482cfdcb5c9

Memory analysis found that once loaded in memory, the strings within the DLL show multiple items of interest, including the configured C2 IP and port, a user-agent, as well as references to PowerShell and ntdll.dll’s LdrLoadDll function, which can be used for DLL loading:

df798a6a1109d9d4c9251e43b6e3914c5cbb3d1d9e45105dc17ebdca6f80d12d

The full initial access and execution chain is captured below:

cde175d4fdaab21a18114ea1eab2ad677e7911cfa222ccffe587dcb352d2a914

ccs.exe

On day six, MSBuild.exe wrote C:\Users\Public\Music\ccs.exe to disk. The ccs.exe binary was subsequently executed with MSBuild.exe as the parent process. Exiftool analysis revealed that the binary contained the following metadata, designed to impersonate Avast Antivirus:

fe2620af0598f42150278e4be6225dbc673dfa324652dd8ea1393695fb38550d

At the time of writing, ccs.exe is widely recognized as malicious in VirusTotal and was identified as Betruger backdoor by Symantec, a tool commonly used by RansomHub affiliates. According to Symantec’s analysis, the Betruger backdoor incorporates functionality typically found across multiple pre-ransomware tools, consolidating various attack capabilities into a single executable.

Betruger’s comprehensive feature set includes screenshotting, keylogging, file exfiltration, network reconnaissance, privilege escalation, and credential harvesting. This extensive functionality suggests that Betruger was explicitly developed to streamline ransomware operations by reducing the number of distinct tools that need to be deployed on a compromised network during the preparation phase of an attack.

Once executed, ccs.exe then injected itself into the memory of 172 distinct running processes. The call trace logged in Sysmon Process Access events shows ccs.exe injecting itself into these processes’ memory:

0da03eae103d2570beb368545d9f605ab52d22cc3d085290fb5b61a91538f389

vhd.dll

Lastly, we also observed another execution of a suspicious DLL (vhd.dll) dropped on the disk in the same staging folder of the threat actor. The threat actor used this PowerShell command to set the working directory to C:\Users\Public\Music, a publicly writable folder where they had staged their malicious payloads. This allowed them to later execute VHD.dll via rundll32.exe without specifying a full path, simplifying execution and reducing the visibility of suspicious file paths in command-line logs.

278ce71919d8a2b83acca88367e45b3cd7160200c132bfcb485e459cce4c5ad5

Upon execution, the vhd.dll would ask for a key, which is needed in order to fully execute the program. While checking the codes, we observed vhd.dll is a loader that asks for a key to decrypt a local file (data.dat) containing a hidden payload. Once decrypted, it executes the payload to ensure it only runs if the correct key is provided. Unfortunately, we were unable to fully attribute or deeply analyze the .DAT file to determine its specific purpose or associated malware family.

2f61c88e35fdacedd56ea9e8a8067b1f39f01e92d5b2a30c6c1a72c658848fc3

Persistence

1fa60daf3d6be41959fda5703e4a00c59d129ec2e3dd718926e5900153e16a30

Following the execution of the malicious binary EarthTime.exe, the threat actor leveraged the Windows Background Intelligent Transfer Service (BITS) to establish persistence through two coordinated activities. The first transfer involved copying the original executable to a new location at C:\Users\<REDACTED>\AppData\Roaming\QuickAgent2\ and renaming it to ChromeAlt_dbg.exe, likely to masquerade as a legitimate Chrome debugging utility. The second transfer created a shortcut file ChromeAlt_dbg.lnk and placed it in the C:\Users\<REDACTED>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ directory. Through the creation of this startup entry, the threat actor successfully established a persistence mechanism with ChromeAlt_dbg.lnk setup to execute the renamed Earthtime.exe file, ChromeAlt_dbg.exe.

b819a84258b1001f11a01081234e8a9a55f984f9171df208e57f4d46be814820

During the intrusion, the threat actor created a local account named “Admon” with the password “Qwerty12345!” using the legitimate binary net.exe on the beachhead host.

1df704f9658bfb42d8a1ff1bfd6ca6ba6909ebc51b1bb425ecf86ddfd602cfe1

Privilege Escalation

The threat actor created a new local user account called “Admon” with the password “Qwerty12345!” on the compromised system. They then added this newly created account to the local Administrators group, giving themselves full administrative privileges on the machine.

475416d8fce91ad0ce622826a0856e05db65a279be55b33c1a4b04d8ad24b769

The threat actors leveraged Microsoft Sysinternals’ PsExec utility for local privilege escalation on the compromised host. By utilizing the “-s” parameter, the adversaries were able to execute malicious binaries with SYSTEM-level privileges, effectively escalating from their initial user-level access to the highest administrative privileges on the Windows system.

416eb99c188b4c9c7f349c1f30bc853817cc6c33e9bdb4af7cec01df034b1696

Defense Evasion

During the initial access malware execution a SectopRAT binary was written to %AppData%\Local\Temp as bhnwcwgaphpge. This was then injected into the MSBuild.exe process to run the malware.

05d1fca7a3960c5c7993b6b4e5a7f547331842b4221deb8f24be97e938c8033b

Two of the binaries observed in this attack were masquerading as products from well-known and reputable security vendors.

The first binary, GT_NET.exe is associated with Grixba, a custom data-gathering tool used by the Play ransomware group. Its metadata was crafted to impersonate SentinelOne security software, complete with fake product names, descriptions, and copyright information referencing “Sentinel Labs, Inc.” The team from Field Effect also noticed this, as per their blog back in January of this year.

The second binary, ccs.exe contains the Betruger backdoor commonly deployed by RansomHub affiliates. This malware was designed with extensive metadata mimicking Avast Antivirus, including legitimate-appearing product names, version numbers, and copyright information. The threat actors even used a filename convention (“aswAvBootTimeScanShMin.exe”) that closely resembles authentic Avast components.

1309143a2ba46c4e8e0ead02c5840774753b6e6baaccfe08213f80967b10b5d0

We also observed the threat actor attempting to disable Windows Defender’s security features by modifying critical registry keys on the domain controller and backup server. Examining the registry events reveals a step-by-step approach to disable multiple Windows Defender registry keys, including real-time scanning, behavior monitoring, anti-spyware detection, and network protection. These registry changes focused on the Windows Defender policy area (HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\), showing the threat actor wanted to make system-wide security changes that would last through reboots and affect all users. By targeting the policy registry instead of user-specific settings, the threat actor made sure they had maximum impact while keeping their changes in place during their attack.

d5e44f8c64c0198cd9354e454d56df896e277898f608a9eddf5171dd6e004c64

Lastly, the theater actor performed potentially time-stomping activities by manipulating the metadata of the ExportData.db file, which contained the scan results, by executing the “GT_NET.exe” binary. This timestomping occurred immediately after GT_NET.exe created the ExportData.db file, which suggests the threat actor attempts to cover its tracks by automatically changing the timestamps of its created files. The choice of a future date (2037) is particularly telling – it’s far enough from the actual attack time frame to potentially throw off forensic analysis that relies on file timestamps to understand the sequence of events. Below is the sequence of events by looking at Sysmon Event ID 2.

c3ed11ce42e7a483365f7ab087f2ec0cd19b3022a412ea3e7174009257b48912

Credential Access

The threat actor employed various methods to access credentials throughout this intrusion, including information stealers, Veeam database credential dumping, DCSync attacks, and the deployment of Betruger backdoor malware.

Information Stealers

YARA scans on memory dumps from the beachhead returned various hits for Arechclient malware (aka SectopRAT) with the following signature:

Windows.Trojan.Arechclient2

SectopRAT is widely known to have information-stealing capabilities, which are on display in the strings from this particular dump. The strings reference scans for various services, including Steam, Discord, Telegram, web browsers, and crypto wallets, which is textbook infostealer activity.

152be71c263346063f3bd5c450ee07b9fa8eb767c5916c9ac8260e01a6c10618

Veeam Database Credential Dumping

Windows Event ID 4104 from the Microsoft-Windows-PowerShell/Operational log is generated by PowerShell’s script block logging feature, which records the execution of PowerShell scripts. This artifact revealed that the threat actor executed a script on the backup server to extract credentials from a Veeam database. The script contains multiple sections, which have been broken down into smaller parts for better readability.

The first section queries the Windows Registry for SQL Server instances and targets a hardcoded database named “VeeamBackup”. The $SQLQuery variable was configured to retrieve the top 1000 rows from the Credentials table within the VeeamBackup database:

"# SQL Server and database\\"$hostname = hostname"$SQLInstances = (Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Microsoft SQL Server').InstalledInstances""$SQLServer = \"$hostname\\$SQLInstances\" #use Server\\Instance for named SQL instances! ""$SQLDBName = \"VeeamBackup\"""# SQL Query""$SqlQuery = \"SELECT TOPdatabase (1000) [id],[user_name],[password],[usn],[description],[visible],[change_time_utc]FROM [VeeamBackup].[dbo].[Credentials]\""

The next section of the script establishes a connection to the SQL Server database, executes the query stored in the $SQLQuery variable, stores the results in a dataset, and then closes the connection:

"# Connection string "$SqlConnection = New-Object System.Data.SqlClient.SqlConnection"$SqlConnection.ConnectionString = \"Server = $SQLServer; Database = $SQLDBName; Integrated Security = True\" $SqlCmd = New-Object System.Data.SqlClient.SqlCommand$SqlCmd.CommandText = $SqlQuery$SqlCmd.Connection = $SqlConnection$SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter$SqlAdapter.SelectCommand = $SqlCmd$Result= New-Object System.Data.DataSet$SqlAdapter.Fill($Result)"#Close the connection "$SqlConnection.Close()

The next section of the script was used to convert DataTable rows to PowerShell objects:

$MyArray = ForEach ($Row in $Result.Tables[0].Rows) { $Record = New-Object PSObject ForEach ($Col in $Result.Tables[0].Columns.ColumnName) { Add-Member -InputObject $Record -NotePropertyName $Col -NotePropertyValue $Row.$Col } $Record}

The final section of the script contains a for loop that performs the following actions:

  • Iterates through each item in the $MyArray variable
  • Loads the DLL Veeam.Backup.Common.dll (required to access the class needed for password decryption)
  • Uses Veeam’s ProtectedStorage class to decrypt the encoded passwords
  • Displays usernames, decrypted passwords, and descriptions to the console
for ($i = 0; $i -lt $MyArray.Length; $i++) { Add-Type -Path "C:\Program Files\Veeam\Backup and Replication\Backup Catalog\Veeam.Backup.Common.dll" $encoded = $MyArray.password[$i] $pass = [Veeam.Backup.Common.ProtectedStorage]::GetLocalString($encoded) Write-Host "==================" Write-Host "user_name: " $MyArray.user_name[$i] Write-Host "password: " $pass Write-Host "description:" $MyArray.description[$i] Write-Host "=================="

DCSync

Credentials were also dumped via a DCSync attack using a privileged account. The activity was observed in Windows Security Event ID 4662, with clear indicators including a non-computer-based account, an access mask of 0x100, and the following object ID:

{1131f6ad-9c07-11d1-f79f-00c04fc2dcd2} = DS-Replication-Get-Changes

6e6af80d40459e9c8d9e6814993f2b729d1c3acf0dabb0570fc60a44a890f839

Betruger Backdoor

As outlined in the Command and Control section of this report, the file hash for the executable C:\Users\Public\Music\ccs.exe returned a direct match for the Betruger backdoor. According to research conducted by the Symantec team, this backdoor is multifunctional and includes modules designed for credential dumping. The backdoor accessed the LSASS process memory to harvest credentials, which was observed through a Sysmon process access event showing a GrantedAccess value of 0x1410.

9e4c23ed9694acdfa2902bf4dae8753e545141d4ad091ec169dbe518f05080e9

Discovery

Local system discovery

The initial execution of MSBuild.exe on the beachhead led to the discovery of commands such as ipconfig, nslookup and net localgroup. Below is the illustration of the execution chain involving multiple Windows built-in commands abused by the threat actor.

3aec643a9ac5f9493011993a869e0125baaf90a4ca24d354adbd0f9f20fe4b04

On day six of the intrusion, additional discovery and reconnaissance commands were executed on the compromised beachhead host. These commands were spawned as child processes of the Betruger ccs.exe process and included whoami for identity verification, net user and net group for local and domain user enumeration, nltest for domain trust relationship analysis, and ping for network connectivity testing.

c8210661f3b932d7b34f1d0370a22ce02dfdc49bf3afd6ef7948143a42e84197

The cmd.exe process spawned by Betruger also wrote several suspicious hidden files indicative of discovery in the user’s Downloads directory, which was also the CurrentDirectory:

24d0b55cc0c23e846d75569c7e874a40a953434df43692a2710e3ee994370a34

Network Scanning

During the intrusion, the threat actor two versions of the Grixba tool. Grixba is a custom tool reportedly used by Play Ransomware that scans computer networks to find users, computers, and installed software using built-in Windows tools like WMI and WinRM. It specifically looks for security programs, antivirus software, backup tools, and office applications for reconnaissance purposes. An analysis of a Grixba sample revealed the following help message and functionality:

31dca21b75117e89e6919a9f025c63fa8db20951835b6014b3c5eaf4973f5735

During day two of the intrusion, the threat actor deployed the Grixba reconnaissance tool (GT_NET.exe) on the compromised backup server. The malware was executed through a cmd.exe parent process using the command line.

GT_NET.exe -m:scan -i:f -d:list.txt

Here’s the command line options breakdown:

-m:scan - Sets the mode/method to scan.-i:f - Input parameters set to "f" (file)-d:list.txt - Destination parameter pointing to list.txt. Can be used to load target IPs. 

GT_NET.exe generated 3,861 internal DNS queries and established 186 network connections during its execution. The majority of connections targeted destination port 135 (Microsoft RPC), with additional connections to port 389 (LDAP) and various high-numbered ephemeral ports ranging from 49666 to 63964. The creation of data.zip and ExportData.db files align with behavioral indicators documented by Field Effect’s research on Grixba malware in their published analysis.

edacebb195c9caa45073b6c97a9f0ece23ceffabe119afdb8c48ccfb99841aec

Another network scanning tool used was the SoftPerfect tool netscan.exe, which was executed on the domain controller from the path C:\Users\Public\Music\123\123\netscan.exe and scanned ports 135 (RPC), 445 (SMB) and 3389 (RDP) across 46 IP addresses. During the netscan execution on the domain controller, we observed the creation of a file called delete.me on the C$ share of the beachhead workstation, logged by Event ID 5145. This activity has been previously observed related to netscan.exe when the ‘Check for write access’ option is enabled, as detailed in previous reports: https://thedfirreport.com/2025/02/24/confluence-exploit-leads-to-lockbit-ransomware and https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours

Prior to the execution of netscan.exe, we also observed the threat actors creating netscan.xml in the same directory as the executable. This file was retrieved for analysis, and inspecting its contents shows the checkwrite flag was indeed enabled:

68b8817eb20fa9efcce957d467f4036039c764eaf3cc362bd8eda526cdc8f26c

Digging into the netscan.xml config file, it’s clear that the threat actors tweaked it to suit their needs, with a big focus on using PsExec to run scripts remotely. This setup enables them to deploy batch files, such as newuser.bat,openrdp.bat, and start.bat across the network. This opens the door to tasks like setting up new user accounts, enabling RDP access, and deploying additional malicious payloads.

632acf2080f24e38c65f2683ad3f5e9e58c28c2a0e2d9cb5950cc0a18a7d9e87

While examining the files associated with NetScan, we observed one output file with a filename matching the name of a company, potentially indicating a victim of this threat actor. Based on OSINT data, this organization has been compromised by DragonForce, as evidenced by their company profile being posted on DragonForce’s data leak site (DLS).

7cf7d21004abc31210171caa57e1d93566ec8d20b2333ee860e557e10d7bfee7

The third and final tool used for network scanning was GRB_NET.exe (another version of Grixba).

3822d4dfd832e321aa71b9f4bc39da638af4774d0d26bd5a037cec331cb00c23

This was executed on the domain controller from two different paths using different command line arguments:

096e09ecc89e8b0e50af05b0302d4a82336ac59e4521757bf49f7ad235289f9f

Upon execution, GRB_NET.exe initiated extensive network reconnaissance by generating 1,373 DNS A record queries to enumerate internal domain hosts and establishing 145 network connections. These connections primarily targeted port 135 (Microsoft RPC) and port 389 (LDAP) for service enumeration, along with ephemeral ports in the range 49666-51508. Following the reconnaissance phase, the malware created an archive file C:\Users\Public\Music\export.zip likely containing the collected data. GRB_NET.exe is unsigned and recognized as malicious by 10 vendors in VirusTotal.

438e0f9aa9436ec66b46a7427471d7f791ef001deb971012e1a6a460c4aef86e

Active Directory Discovery

On day two of the intrusion, the threat actors executed SharpHound (disguised as sh.exe) on the domain controller from the directory C:\PerfLogs\. This Active Directory reconnaissance tool was launched with the command line parameters shown below. Binary analysis confirmed the executable’s metadata identifies it as a renamed SharpHound binary, which also indicates evasion tactics.

2e656c2a39781c80a80f391ac83ec33abb587df03778a1d07b681c78a941f386

When executed, sh.exe made 1,271 internal DNS A requests, as well as the following network connections, all of which triggered the Sigma rule ‘Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location’:

4f23ebfb06aa1d765ffa2184065aa50fbcb5bc543faccf439c2c032959cff76e

sh.exe also wrote the following files, indicative of BloodHound/SharpHound execution. The writing of these files triggered the following Sigma rules:

  • ‘BloodHound Collection Files’
  • ‘Suspicious File Created in PerfLogs’
  • ‘Windows Shell/Scripting Application File Write to Suspicious Folder’

c259ebacf922694ed263aa4a7a6613d1c6fdc30cc5fd082d34e606043a85bdbd

The threat actor conducted additional Active Directory reconnaissance using the ADFind enumeration tool (Adfind.exe), which was staged in the C:\Users\Public\Music\ directory. The threat actor executed the command with the “-subnets” parameter to query the CN=Subnets,CN=Sites,CN=Configuration partition, where Active Directory stores subnet-to-site mappings and network topology information.

a9d9a14119751d584e824aca48a78a589d664f11770f81cba90ade5886a18290

PowerShell Script Block logging from the Domain Controller (event code 4104) shows the following Get-ADComputer command was imported and then executed to enumerate Active Directory computer objects and output them to a CSV file:

Import-Module ActiveDirectory; Get-ADComputer -Filter {enabled -eq $true} -properties *|select comment, description, Name, DNSHostName, OperatingSystem, LastLogonDate, ipv4address | Export-CSV C:\Users\Public\Music\AllWindows.csv -NoTypeInformation -Encoding UTF8

Other discovery commands executed on the Domain Controller and observed in the PowerShell Script Block logging include:

nltest /domain_trusts /all_trustsnltest /dclist:net group "Domain Admins" /domain

File Discovery

Prior to the archiving stage, we observed the threat actor accessing the contents of multiple files using wordpad.exe, primarily on the file server as part of their discovery phase. On two occasions, the threat actor pivoted to the backup server to view and access files on the shared drives. This demonstrates the lateral movement capabilities and network discovery, which indicates the threat actor had gained extensive knowledge of the organization’s infrastructure and understood how to navigate between systems to access sensitive data efficiently.

f85a52f9c053331487d808e96cb3fdd9fc19aeae76b3bb785e51cdce741b7bdb

One notable document sought out and opened by the threat actor was an insurance policy document covering cyber intrusions.

Where zipped files were found, these were opened using WinRAR:

"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -imon1 – "F:\Shares\<redacted>\<redacted>\<redacted>.zip" F:\Shares\<redacted>\<redacted>\<redacted>\ 

Lateral Movement

The Remote Desktop Protocol (RDP) and Impacket’s wmiexec were used throughout this intrusion to facilitate lateral movement.

13a93777fb0f11e9be67bc13c919fe196ff1669cca435b94993d763eb7bfc040

Remote Desktop Protocol

The adversary primarily relied on Remote Desktop Protocol (RDP) for lateral movement throughout the compromised network. Analysis of Windows security logs revealed a consistent pattern where logon type 3 (network) events were immediately followed by logon type 10 (remote interactive) events, which is characteristic of RDP authentication sequences. This specific logon pattern was likely facilitated by SystemBC malware’s proxy capabilities, which enabled the threat actor to establish RDP connections through compromised systems. Notably, the Windows security event logs disclosed the host names of the threat actor’s workstations: (note the apparent typo in “DESCTOP” in one instance).

DESCTOP-QPITRYDESKTOP-A1HRTMJDESKTOP-PGD76HTWIN-FLGU1CC210K

985f77884f5d6f7fcad6e8cf87532c549e190ea43f5494a348e0bb1372d11964

Impacket

On day six, the threat actor used wmiexec from the Impacket suite to remotely execute various enumeration commands on the domain controller. The parent-child relationship between WmiPrvSE.exe and cmd.exe, combined with the characteristic output redirection to administrative shares, provides a clear signature of wmiexec usage. The commands executed behave as typical post-exploitation reconnaissance activities, with particular focus on enumerating specific user accounts and understanding the current user session.

1ec68d0a0a1c32f2fdd7ae83f14ceba8d525b122f2a1d8def79beed73a12a293

Betruger

After the deployment of the Betruger backdoor on day six, multiple Windows Event IDs 4776 (credential validation) were observed, indicating successful network authentication attempts against the beachhead system. The source workstation associated with these authentication events WIN-FLGU1CC210K had not been observed in any previous activity during this intrusion. Based on the timing correlation with Betruger deployment and the sudden appearance of this previously unseen hostname, we assess with high confidence that this represents an additional workstation under threat actor control.

1b0108d0bdd660712b1a7d81a5ade267b7a8a72412feea6873103ac0b96c28bd

Collection

WinRAR.exe was brought into the victim environment for collection purposes. On day two, during a period of the threat actor’s activity and under a compromised user context, explorer.exe created C:\Users\Public\Music\winrar-x64-611.exe . This binary was then executed and wrote the file C:\Program Files\WinRAR\WinRAR.exe to disk.

The threat actor then used WinRAR.exe to zip victim files on the file share prior to exfiltration. They systematically archived six high-value directories, before performing additional archiving operations on specific files, e.g.

"C:\Program Files\WinRAR\WinRAR.exe" a -ep1 -scul -r0 -iext -imon1 -- . F:\Shares\REDACTED\REDACTED

The threat actor also deployed a tool named FS64.exe, a custom tool designed for automating file collection. During execution, the threat actor specifies the drive or directory from which to collect files, and the tool outputs a .txt file containing the list of collected files. It was executed on the backup server, targeting a remotely mounted share on the file server.

d495f0dbedcaa4b19dd0a7a7aeb70d345138407a6ed563e8f49e40d9d682e8eb

bdcb6367134520d5aa2aa6262485fb05c42ceb8b3c8179dc529ab0e883eab579

The process wrote the file __<redacted_fileserver_ip>_F$_Shares.txt as well as copying multiple .xls, .xlsx, .doc., .docx, .pdf files to the C:\Users\Public\Music\ directory.

Winrar.exe was also used to extract WinSCP.rar in preparation for exfiltration. We also discovered a WinSCP.ini configuration file used by the WinSCP application. The threat actor utilized WinSCP to perform data exfiltration, as detailed in the Exfiltration section of this report. This WinSCP configuration reveals that the threat actor configured a custom file mask targeting a wide range of file types, including web content (.html, .php, .js, .css), configuration files (.cfg, .ini, .htaccess), and scripts/source code (.sh, .pl, .c, .cpp). This selective file mask indicates an intent to specifically identify and exfiltrate files containing website content, credentials, or source code rather than indiscriminately copying all available files.

10e0811a0cf01f3cf17e36016c8084485e43b458a9521f4e8c710126ae73c511

Command and Control

Three separate Command and Control channels were observed: SectopRAT, SystemBC, and Betruger.

SectopRAT

The following Surricata rules triggered on the network traffic, once SectopRAT injected itself into the MSBuild.exe process for IP address 45.141.87[.]55. This IP was tracked by the DFIR Report Threat Intelligence Group as an active SectopRAT C2 server from August 8th 2024 through November 23rd 2024.

The rule “ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init” fired when network traffic to the destination port 15647 was detected.

1eb1ed00d1786ab052bf170eed69470d61ba01df3afb1271f496233230160537

Initiated: true ¦ Proto: tcp ¦ SrcIP: 10.X.X.X ¦ TgtIP: 45.141.87[.]55 ¦ TgtPort: 15647 ¦ Proc: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

The second rule “ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) (SID 2052248)” fired when C2 beaconing activity to destination port 9000 was observed.

c51e518f43559c552e0e2fdb645cd283e9c3624dd2ff4853f46121c83818d384

Initiated: true ¦ Proto: tcp ¦ SrcIP: 10.X.X.X ¦ TgtIP: 45.141.87[.]55 ¦ TgtPort: 9000 ¦ Proc: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

SystemBC

Shortly after the command-and-control (C2) channel was established via the SectopRAT malware, a new file named WakeWordEngine.dll (also observed later in the intrusion named conhost.dll) was created on the beachhead host. This file was identified as the SystemBC tool, which is commonly leveraged for its proxying and tunneling capabilities.

The threat actor used SystemBC to establish a tunnel, enabling Remote Desktop Protocol (RDP) access via proxy connections. This allowed them to pivot into the internal network from external systems, facilitating further post-compromise activity within the environment. The following Sigma rule triggered once the tunnel was established “Outbound RDP Connections Over Non-Standard Tools”.

Initiated: true ¦ Proto: tcp ¦ SrcIP: 10.X.X.X ¦ SrcPort: 62105 ¦ TgtIP: 10.65.45[.]223 ¦ TgtPort: 3389 ¦ Proc: C:\Windows\SysWOW64\rundll32.exe

The activity exposed the client names of the computers used by the threat actor. During the intrusion, the following client names were observed: DESKTOP-A1HRTMJ, DESKTOP-PGD76HT, DESCTOP-QPITRY (sic) and WIN-FLGU1CC210K

Betruger

On the fifth day of intrusion, we observed that the SectopRAT process created a new binary, ccs.exe. This particular binary has been identified as Betruger, a multi-function backdoor which appears to have been explicitly developed for carrying out ransomware attacks. This custom backdoor has been seen used by affiliates of RansomHub.

a3d5fe67ac7c84390f7a966ce2ddb05cf743e87eaed13e5a7679513948ba4a64

Once executed, it will reach out to its command and control infrastructure, which was 504e1c95.host.njalla[.]net.

c6d0316977ed2b694116d5b52021a11feb2d29eb4b7db93d867f764d2da9ea29

Based on OSINT, the 504ec1c95.host.njalla[.]net has been classified as a phishing domain.

3c6683610ba487f1ac0e23ae963675ac9baed38d2c951248659eac0f15cc5238

Based on Symantec’s analysis, the file was identified as the Betruger malware, a multi-functional backdoor. The malware established command and control (C2) communication over multiple IP addresses using ports 80 and 443.

Exfiltration

On day two of the intrusion, the threat actor began preparing for data exfiltration on the file server. The threat actor conducted systematic data archiving as part of their data staging phase before the main data exfiltration activities, as described in the Collection section of this report. Immediately after, the threat actors initiated outbound network traffic to the IP address 144.202.61.209 using WinsCP via File Transfer Protocol (FTP), efficiently exfiltrating the staged files for approximately 15 minutes.

9e5c635548611dfb6ecf90415ea8510e82ac433d42f40d369c897c3b53d84383

Due to the threat actor’s use of the unencrypted FTP protocol rather than SFTP for data exfiltration, packet capture analysis from the file server revealed compromising evidence of the threat actor’s activities in clear text, including their credentials.

f6b5cac99e3e87ea6805cf82a3455490617163378d1b570581ae910a9fbbe33a

Based on the Wireshark capture below, the threat actor connected to an FTP server and began uploading the RAR files they created during data staging, starting with “MDTM **** IT.part1.rar”. The session shows them navigating directories using standard FTP commands (PWD, CWD) and switching between ASCII and binary transfer modes for optimal file transmission. The capture reveals systematic exfiltration of archived organizational data, including attempts to upload “Finance.rar” and other sensitive files they had previously compressed.

08bce7c917acbf139eba70192217db85c73427e7dbae9e867be2af2db2c41a1b

Impact

While no ransomware was deployed before the adversary was evicted from the environment, the threat actor ultimately achieved one of their primary objectives, successfully exfiltrating data from the network. Based on the actions performed by the adversary during this intrusion and the tactics, techniques, and procedures (TTPs) observed throughout the campaign, we assess with high confidence that this was an active ransomware affiliate likely working with various ransomware-as-a-service (RaaS) providers.

17fac8ff75c548ec199006134082a2a293413933f457e22da21c7efcd2a95d8a

Based on the analysis of these intrusion events, we identified multiple indicators linked to three distinct ransomware groups. The detailed attribution matrix is as follows.

Observed TTPsGroupCategory
Grixba (GT_Net.exe)PlayMalware Binary
Grixba (GRB_NET.exe)PlayMalware Binary
Payload staging under C:\Users\Public\Music directoryRansomHubPersistence/Staging
Betruger Backdoor (ccs.exe)RansomHubBackdoor
Usage of BitsAdminRansomHubLOLBins
REDACTED.xml (Netscan output file from another victim)DragonForceDiscovery
SystemBC (wakewordengine.dll | conhost.dll)Play + DragonForceC2/Proxy Mlaware
Impacket (wmiexec)Play + RansomHubLateral Movement / Credential AccessP
NetScan, ADFind, WinRAR, WinSCP, PSExecPlay + RansomHub + DragonForcePost-Exploitation Tools

Timeline

8738232000d6b2033b986c697f68bc1c7ec60cc30491c47d8c1abd378e153f44

Diamond Model

1fe3beb10a801979770266e60e21267e1e6569a1798ab6595b8d757dac385661

Indicators

Atomic

45.141.87.55 - MSBuild.exe C2 (SectopRAT)149.28.101.219 - WakeWordEngine.dll/conhost.dll (SystemBC)504e1c95.host.njalla[.]net - ccs.exe (Betruger)80.78.28.149 - ccs.exe (Betruger)144.202.61.209 - TA's FTP server

Computed

earthtime.exe71f703024c3d3bfc409f66bb61f971a0f24fc14f39c160b54dc3b2fbd1eba605ec0eb04fbcff246f0739ed98f8aa615d256e7e00bc1cb24c8cabaea609b25c3f050c7805wakewordengine.dll / conhost.dlle963d598a86c5ee428a2eefa34d1ffbb142294249feb536e0edbe6e2de3eb3c3415ecf396f9326224e6047458e692cd27aeb1054b9381c67aaf2fe238dbebfbc916c4b33ccs.exe (Betruger)5675a7773f6d3224bfefdc01745f8411c0e5e4b5fcbd0a30b042e602d99a6ee81ad5d8d7ae7c31d4547dd293ba3fd3982b715c65d731ee07a9c1cc402234d8705c01dfcafs64.exec6f92d1801d7d212282a6dd8f11b44fed15d45d9d9a8ef7a9f048d74b386f620f3b82576e1521e077079032df974c7ae39e4737cdb4f05c6ded677ed5446167466eeb899vhd.dll95c96de7dcb5a643559ac66045559cc968b6d0cc1430e2d4f70e2ba5026d1c4847324269a4bc6bebabb52ed9816987b77ebae6ef70e174533a643aea6265bdf1ed9b8952gt_net.exeabb2a6a0f771ab20ce2037d2c4ef5783ac0fcbc148e45e172c9be0acf9c307186f898803aeaf7cc7364a44b381af9f317fe6f78c2717217800b93bee8839ab3e56233254grb_net.exe88df27b6e794e3fd5f93f28b1ca1d3d02114d655805f465d11b720830d150c145039bcd4f8810179ab033a9b79cd7006c1a74fbcde6ed0451c92fbb8c7ce15b52499353aadfind.exe12011c44955fd6631113f68a994475154f4f8cf0f9b47d0ad95d159201fe7e72fbc8448dc92c158d7c37fea795114fa6491fe5f145ad2f8c08776b18ae79db811e8e36a3sh.exe829a9dfd2cdcf50519a1cec1f529854b5bf41754bfb3a18611b2a02f7f385960ed24f8e1a7240d8a7aee872c08b915a58976a1ddee2ff5a8a679f78ec1c7cf528f40deednetscan.exe27f7186499bc8d10e51d17d3d6697bc552332ce16ee0c393b8eea6e71863ad41e3caeafd18f0898d595ec054d13b02915fb7d3636f65b8e53c0c66b3c7ee3b6fc37d3566

Detections

Network

ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET)ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC InitThreatFox SectopRAT botnet C2 traffic (ip:port - confidence level: 100%)ET MALWARE Arechclient2 Backdoor/SecTopRAT Related ActivityET INFO Suspected Impacket WMIExec Activity

Sigma

Search rules on detection.fyi or sigmasearchengine.com

DFIR Private Rules:

85d1ebcc-0145-4033-a344-f9f3a4dd03ac : Sharphound File Writes932dd739-3672-458e-b362-b3cedba992ba : Grixba Reconnaissance Tool Execution97350071-6934-4d1e-863d-23b7f51fb17d : SharpHound Active Directory Enumeration Tool Execution

Sigma Repo:

17d619c1-e020-4347-957e-1d1207455c93 : Active Directory Replication from Non Machine Accountb85e5894-9b19-4d86-8c87-a2f3b81f0521 : BITS Transfer Job Downloading File Potential Suspicious Extension6d44fb93-e7d2-475c-9d3d-54c9c1e33427 : BITS Transfer Job With Uncommon Or Suspicious Remote TLD02773bed-83bf-469f-b7ff-e676e7d78bab : BloodHound Collection Filesf376c8a7-a2d0-4ddc-aa0c-16c17236d962 : HackTool – Bloodhound/Sharphound Execution611eab06-a145-4dfa-a295-3ccc5c20f59a : Mimikatz DC Sync7b434893-c57d-4f41-908d-6a17bf1ae98f : Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Locationed74fe75-7594-4b4b-ae38-e38e3fd2eb23 : Outbound RDP Connections Over Non-Standard Toolscf879ffb-793a-4753-9a14-bc8f37cc90df : Potential Qakbot Rundll32 Execution3dfd06d2-eaf4-4532-9555-68aca59f57c4 : Process Execution From A Potentially Suspicious Folder304afd73-55a5-4bb9-8c21-0b1fc84ea9e4 : PSEXEC Remote Execution File Artifact7c0dcd3d-acf8-4f71-9570-f448b0034f94 : PsExec Service Child Process Execution as LOCAL SYSTEM9a132afa-654e-11eb-ae93-0242ac130002 : PUA – AdFind Suspicious Executionb447f7de-1e53-4cbf-bfb4-f1f6d0b04e4e : Suspicious Binaries and Scripts in Public Folderbbb7e38c-0b41-4a11-b306-d2a457b7ac2b : Suspicious File Created In PerfLogs1277f594-a7d1-4f28-a2d3-73af5cbeab43 : Windows Shell/Scripting Application File Write to Suspicious Folder

Yara

MALPEDIA_Win_Systembc_AutoDITEKSHEN_MALWARE_Win_EXEPWSH_DlagentTELEKOM_SECURITY_Win_Systembc_20220311EXT_MAL_SystemBC_Mar22_1ELASTIC_Windows_Trojan_Systembc_C1B58C2FSUSP_XORed_URL_In_EXEDITEKSHEN_MALWARE_Win_Arechclient2ELASTIC_Windows_Trojan_Redlinestealer_15Ee6903ELASTIC_Windows_Generic_Threat_2Ae9B09E

MITRE ATT&CK

9351a5f01d42d0c7c184ff655e796f98be7e7b263ec891173bdbe429014f0b14

Additional Local or Domain Groups - T1098.007Archive via Utility - T1560.001Automated Collection - T1119Create Account - T1136Credentials from Password Stores - T1555DCSync - T1003.006Disable or Modify Tools - T1562.001Domain Account - T1087.002Domain Groups - T1069.002Domain Trust Discovery - T1482Exfiltration Over Alternative Protocol - T1048File and Directory Discovery - T1083Group Policy Discovery - T1615Lateral Tool Transfer - T1570Local Account - T1087.001Local Account - T1136.001Local Groups - T1069.001LSASS Memory - T1003.001Malicious File - T1204.002Masquerading - T1036MSBuild - T1127.001Network Service Discovery - T1046Network Share Discovery - T1135Obfuscated Files or Information - T1027PowerShell - T1059.001Protocol Tunneling - T1572Proxy - T1090Registry Run Keys / Startup Folder - T1547.001Remote Desktop Protocol - T1021.001Remote System Discovery - T1018Service Execution - T1569.002System Network Configuration Discovery - T1016Timestomp - T1070.006Web Protocols - T1071.001Windows Command Shell - T1059.003Windows Management Instrumentation - T1047Windows Service - T1543.003

Internal Case #TB32034 #PR37389


Original Source


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.