Hide Your RDP: Password Spray Leads to RansomHub Deployment

A threat actor conducted a multi-day intrusion starting with a password spray attack on an exposed RDP server, followed by credential harvesting using Mimikatz and Nirsoft tools, extensive network discovery, data exfiltration via Rclone over SFTP, and finally deploying RansomHub ransomware across the network using SMB and remote services. The incident featured lateral movement using legitimate tools like Atera and Splashtop for persistence and exhibited advanced evasion tactics including clearing shadow copies and event logs. #RansomHub #Mimikatz #Rclone #Atera #Splashtop #RDPPasswordSpray

Keypoints

  • The intrusion began in November 2024 with a password spray attack against an internet-facing RDP server from known malicious IPs.
  • The threat actor harvested credentials using Mimikatz and Nirsoft CredentialsFileView, including LSASS memory extraction.
  • Network discovery was performed using living-off-the-land binaries, Advanced IP Scanner, SoftPerfect NetScan, and MMC snap-ins.
  • Rclone was used to exfiltrate approximately 2.03 GB of sensitive files over SFTP to a remote server on port 443.
  • Lateral movement leveraged RDP, deployment of legitimate remote management tools Atera and Splashtop for persistence and access.
  • On day six, RansomHub ransomware was deployed network-wide, spreading through SMB and executed via remote services.
  • The ransomware deleted shadow copies, stopped virtual machines, cleared event logs, and dropped ransom notes linking to RansomHub.

MITRE Techniques

  • [T1110.003] Password Spraying – Initial access via repeated login attempts on RDP using known malicious IP addresses (‘password spray attack targeting an internet-facing Remote Desktop Protocol (RDP) server’).
  • [T1003.001] LSASS Memory – Credential dumping using Mimikatz targeting LSASS process memory (‘commands targeting the Local Security Authority Subsystem Service (LSASS) process, such as “sekurlsa::logonpasswords”’).
  • [T1083] File and Directory Discovery – Using net commands and MMC snap-ins to enumerate users, groups, and files (‘performed discovery of the victim network and enumerated user groups, domain accounts, and computers’).
  • [T1046] Network Service Discovery – Leveraged Advanced IP Scanner and NetScan tools to map the network (‘Advanced IP Scanner was downloaded… and a network scan was initiated’).
  • [T1048] Exfiltration Over Alternative Protocol – Data exfiltrated over SFTP using Rclone (‘Rclone was used to exfiltrate data to a remote server using SFTP over port 443’).
  • [T1021.001] Remote Desktop Protocol – Lateral movement and persistence via RDP sessions across multiple hosts (‘used RDP to move laterally to two domain controllers and other hosts’).
  • [T1133] External Remote Services – Use of Atera and Splashtop remote management for persistent access (‘threat actor deployed Atera and Splashtop RMM tools on several hosts’).
  • [T1486] Data Encrypted for Impact – Deployment of RansomHub ransomware encrypting files and disrupting systems (‘ransomware encrypted files and deleted shadow copies on local and remote hosts’).
  • [T1070.001] Indicator Removal on Host – Deletion of shadow copies and clearing event logs (‘commands used to remove shadow copies and clear Windows logs’).
  • [T1543.003] Windows Service – Ransomware executed remote services to propagate (‘executed ransomware on hosts using remote services creating new service entries’).

Indicators of Compromise

  • [IP Addresses] Password spray sources and access points – 185.190.24.54, 185.190.24.33 (password spray sources), 164.138.90.2 (initial access user login), 38.180.245.207:443 (exfiltration destination)
  • [File Hashes] Malicious executables – amd64.exe (ransomware binary): 6f3a658fc32b4a378716ac167ebaf5ac; rcl.bat (Rclone batch script): 1cc1534b70b8d2b99b69a721c83e586a; nocmd.vbs (Visual Basic script): 8e0b1f8390acb832dbf3abadeb7e5fd3; netscan.exe (network scanner): a768244ca664349a6d1af84a712083c0
  • [File Names] Executed scripts and binaries – amd64.exe (ransomware), rcl.bat and nocmd.vbs (exfiltration scripts), netscan.exe (network discovery tool), setup.msi (installer)
  • [Domains] Observed network activity – splashtop.com (remote access), Atera-related domains (remote management)


Read more: https://thedfirreport.com/2025/06/30/hide-your-rdp-password-spray-leads-to-ransomhub-deployment/