Ransomware Rampage: A Hilariously Complex Saga of Digital Missteps and Malware Misadventures
When a user mistook a malicious file for DeskSoft’s EarthTime, they unwittingly invited SectopRAT malware to the party. The threat actor was busy deploying multiple malware families like SystemBC and Betruger backdoor, mapping out the network like a bad tourist with no regard for data privacy. Classic ransomware mischief!

Hot Take:
When life gives you EarthTime, make sure it’s not EarthCrime! In a plot twist more surprising than finding a cat meme in your boss’s presentation, unsuspecting users downloaded what they thought was a nifty world clock app but got an entire criminal circus instead. It’s like expecting a cozy bedtime story and getting a Stephen King novel! So, remember, folks, always check under the hood before you hit download – or you might just end up with a cyber-monster in your machine!
Key Points:
- Cybercriminals used a malicious EarthTime application to deploy the SectopRAT malware.
- Various malware families, including SystemBC and Betruger backdoor, were utilized for reconnaissance and persistence.
- Lateral movement was done using RDP and Impacket’s wmiexec, targeting systems like domain controllers.
- Data exfiltration involved compressing files with WinRAR and transferring them via unencrypted FTP.
- The operation pointed towards ransomware deployment, likely by an affiliate of multiple ransomware groups.