Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

OSINT - Egregor RaaS Continues the Chaos with Cobalt Strike and Rclone

0
Medium
Published: Mon Jan 04 2021 (01/04/2021, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: type
Product: osint

Description

OSINT - Egregor RaaS Continues the Chaos with Cobalt Strike and Rclone

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 12/24/2025, 06:12:36 UTC

Technical Analysis

Egregor is a ransomware-as-a-service (RaaS) operation that has been active since late 2020, known for combining ransomware payload deployment with data exfiltration to increase pressure on victims. This threat intelligence highlights Egregor's continued use of Cobalt Strike, a legitimate penetration testing tool often abused by threat actors for command and control (C2) and lateral movement within compromised networks. Additionally, the use of Rclone, a command-line program to manage files on cloud storage, indicates the adversaries' focus on exfiltrating large volumes of data stealthily to cloud repositories before or after encryption. The campaign does not specify affected software versions or patches, reflecting that the attack vector is more about exploiting network and system misconfigurations, weak credentials, or phishing rather than a specific software vulnerability. The medium severity rating aligns with the threat's capability to disrupt operations through ransomware encryption and cause significant data confidentiality breaches via exfiltration. The lack of known exploits in the wild suggests that the threat actors rely on social engineering, credential theft, or other initial access methods rather than zero-day vulnerabilities. The intelligence is sourced from CIRCL OSINT feeds and tagged with MISP galaxy ransomware taxonomy, confirming its classification and ongoing relevance. The technical details include a unique identifier and timestamp but no direct exploit code or indicators of compromise, emphasizing the need for behavioral detection methods.

Potential Impact

For European organizations, the Egregor ransomware campaign poses a dual threat: operational disruption due to ransomware encryption and reputational and regulatory damage from data breaches caused by exfiltration. Critical sectors such as finance, healthcare, manufacturing, and government entities are particularly vulnerable due to their reliance on continuous availability and sensitive data handling. The use of Cobalt Strike facilitates deep network penetration and lateral movement, increasing the likelihood of widespread compromise within an organization. Rclone's involvement indicates that attackers can bypass traditional perimeter defenses by transferring data to cloud storage, complicating detection and response. The impact extends beyond immediate financial losses from ransom payments to include long-term costs related to data recovery, legal penalties under GDPR, and erosion of customer trust. European organizations with insufficient network segmentation, weak credential management, or inadequate monitoring of cloud data transfers are at heightened risk. The campaign's medium severity suggests that while exploitation is not trivial, the consequences of a successful attack are significant.

Mitigation Recommendations

European organizations should implement advanced network monitoring to detect Cobalt Strike activity, including unusual beaconing patterns and command and control communications. Deploying endpoint detection and response (EDR) solutions capable of identifying suspicious use of tools like Rclone is critical, as is restricting its use to authorized personnel and systems only. Network segmentation should be enforced to limit lateral movement opportunities for attackers. Multi-factor authentication (MFA) must be mandatory for all remote access and privileged accounts to reduce the risk of credential compromise. Regular phishing awareness training can mitigate initial access vectors commonly exploited by ransomware groups. Organizations should maintain offline, immutable backups to ensure recovery without paying ransom. Incident response plans must include procedures for detecting and responding to data exfiltration attempts, including monitoring outbound traffic to cloud storage services. Collaboration with national cybersecurity centers and sharing threat intelligence can enhance preparedness. Finally, applying threat hunting techniques focused on behavioral indicators associated with Egregor's tactics will improve early detection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
f42c106c-df01-47f3-bc36-16072ad63856
Original Timestamp
1609779788

Indicators of Compromise

Ip

ValueDescriptionCopy
ip45.153.242.129
ip217.8.117.148
ip45.11.19.70
ip185.238.0.233

File

ValueDescriptionCopy
file49.12.104.241
On port 81

Hash

ValueDescriptionCopy
hash81
On port 81
hash8483aaf9e1fa5b46486c9f2a14c688c30d2006e88de65d0295a57892de0bf4c9
hash3fd510a3b2e0b0802d57cd5b1cac1e61797d50a08b87d9b5243becd9e2f7073f
hash2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf
hash444a6897058fd4965770167b15a2ab13e6fd559a3e6f6cf5565d4d3282587459
hashc3c50adcc0a5cd2b39677f17fb5f2efca52cc4e47ccd2cdbbf38815d426be9e1
hash004a2dc3ec7b98fa7fe6ae9c23a8b051ec30bcfcd2bc387c440c07ff5180fe9a
hash608b5bf065f25cd1c6ac145e3bcdf0b1b6dc742a08e59ec0ce136fe5142774e9
hash3e5a6834cf6192a987ca9b0b4c8cb9202660e399ebe387af8c7407b12ae2da63
hash4ea8b8c37cfb02ccdba95fe91c12fb68a2b7174fdcbee7ddaadded8ceb0fdf97
hash9017c070ad6ac9ac52e361286b3ff24a315f721f488b53b7aaf6ac35de477f44
hashee06c557f1acd5c4948b1df0413e49f3885f8ac96185a9d986b91a1231444541
hash765327e1dc0888c69c92203d90037c5154db9787f54d3fc8f1097830be8c76ab
hash14e547bebaa738b8605ba4182c4379317d121e268f846c0ed3da171375e65fe4
hash3fc382ae51ceca3ad6ef5880cdd2d89ef508f368911d3cd41c71a54453004c55
hashf0adfd3f89c9268953f93bfdfefb84432532a1e30542fee7bddda14dcb69a76c
hasha9d483c0f021b72a94324562068d8164f8cce0aa8f779faea304669390775436
hash3aad14d200887119f316be71d71aec11735dd3698a4fcaa50902fce71bdccb07
hash6ad7b3e0873c9ff122c32006fdc3675706a03c4778287085a020d839b74cd780
hash932778732711cd18d5c4aabc507a65180bf1d4bd2b7d2d4e5506be4b8193596e
hash6f600974c45eec97016c1259e769a4ef
hash56eed20ea731d28d621723130518ac00bf50170d
hash9017c070ad6ac9ac52e361286b3ff24a315f721f488b53b7aaf6ac35de477f44
hash666f8d920f85f9afffcf0865a98efe69
hash50c3b800294f7ee4bde577d99f2118fc1c4ba3b9
hasha9d483c0f021b72a94324562068d8164f8cce0aa8f779faea304669390775436
hash44a7085f729b68073b5c67bbc66829cc
hash3c03a1c61932bec2b276600ea52bd2803285ec62
hash8483aaf9e1fa5b46486c9f2a14c688c30d2006e88de65d0295a57892de0bf4c9
hash0de24cec66ef9d1042be7cf12b87cfc4
hashf7bf7cea89c6205d78fa42d735d81c1e5c183041
hash765327e1dc0888c69c92203d90037c5154db9787f54d3fc8f1097830be8c76ab
hashde3110dce011088cd4add1950a49182f
hashc9da06e3dbf406aec50bc145cba1a50b26db853a
hash608b5bf065f25cd1c6ac145e3bcdf0b1b6dc742a08e59ec0ce136fe5142774e9
hash8ba3a9d73903bd252f8d99a682d60858
hash95aea6b24ed28c6ad13ec8d7a6f62652b039765e
hash444a6897058fd4965770167b15a2ab13e6fd559a3e6f6cf5565d4d3282587459
hash81bc3a2409991325c6e71a06f6b7b881
hash38c88de0ece0451b0665f3616c02c2bad77a92a2
hash2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf
hash65c320bc5258d8fa86aa9ffd876291d3
hashf0215aac7be36a5fedeea51d34d8f8da2e98bf1b
hash3fd510a3b2e0b0802d57cd5b1cac1e61797d50a08b87d9b5243becd9e2f7073f
hashac33fea4c2a9bbca3559142838441f84
hash948ef8caef5c1254be551cab8a64c687ea0faf84
hash932778732711cd18d5c4aabc507a65180bf1d4bd2b7d2d4e5506be4b8193596e
hashdd8e8bfb45fcd5f0621fe7085bfcab94
hash5c99dc80ca69ce0f2d9b4f790ec1b57dba7153c9
hash3aad14d200887119f316be71d71aec11735dd3698a4fcaa50902fce71bdccb07
hash427105821263afeeccca05b43ea8dac4
hashfa33fd577f5eb4813bc69dce891361871cda860c
hashee06c557f1acd5c4948b1df0413e49f3885f8ac96185a9d986b91a1231444541
hashd1aa0f26f557addd45e0d9fa4afecf15
hashf1603f1ddf52391b16ee9e73e68f5dd405ab06b0
hash14e547bebaa738b8605ba4182c4379317d121e268f846c0ed3da171375e65fe4
hasha922987d1488e2dede7e39a99faf98bb
hashbeb48c2a7ff957d467d9199c954b89f8411d3ca8
hash6ad7b3e0873c9ff122c32006fdc3675706a03c4778287085a020d839b74cd780
hash5f9fcbdf7ad86583eb2bbcaa5741d88a
hash03cdec4a0a63a016d0767650cdaf1d4d24669795
hash004a2dc3ec7b98fa7fe6ae9c23a8b051ec30bcfcd2bc387c440c07ff5180fe9a
hash9b7ccaa2ae6a5b96e3110ebcbc4311f6
hash3cc616d959eb2fe59642102f0565c0e55ee67dbc
hashc3c50adcc0a5cd2b39677f17fb5f2efca52cc4e47ccd2cdbbf38815d426be9e1
hash1d6aa29e98d3f54b8c891929c34eb426
hashceca1a691c736632b3e98f2ed5b028d33c0f3c64
hash3e5a6834cf6192a987ca9b0b4c8cb9202660e399ebe387af8c7407b12ae2da63
hashc3c7a97da396085eb48953e638c3c9c6
hash8768cf56e12a81d838e270dca9b82d30c35d026e
hash3fc382ae51ceca3ad6ef5880cdd2d89ef508f368911d3cd41c71a54453004c55
hashc96df334b5ed70473ec6a58a545208b6
hashf6ad7b0a1d93b7a70e286b87f423119daa4ea4df
hash4ea8b8c37cfb02ccdba95fe91c12fb68a2b7174fdcbee7ddaadded8ceb0fdf97
hash7375083934dd17f0532da3bd6770ab25
hashac6d919b313bbb18624d26745121fca3e4ae0fd3
hashf0adfd3f89c9268953f93bfdfefb84432532a1e30542fee7bddda14dcb69a76c

Url

ValueDescriptionCopy
urlhttp://185.238.0.233/p.dll
urlhttp://185.238.0.233/b.dll
urlhttp://185.238.0.233/sed.dll
urlhttp://185.238.0.233/hnt.dll
urlhttp://185.238.0.233/88/k057.exe
urlhttp://185.238.0.233/newsvc.zip
urlhttp://egregoranrmzapcv.onion
urlhttps://egregornews.com/
urlhttp://egregor4u5ipdzhv.onion/
Payment Portal

Link

ValueDescriptionCopy
linkhttps://labs.sentinelone.com/egregor-raas-continues-the-chaos-with-cobalt-strike-and-rclone/
linkhttps://www.virustotal.com/gui/file/9017c070ad6ac9ac52e361286b3ff24a315f721f488b53b7aaf6ac35de477f44/detection/f-9017c070ad6ac9ac52e361286b3ff24a315f721f488b53b7aaf6ac35de477f44-1607607889
linkhttps://www.virustotal.com/gui/file/a9d483c0f021b72a94324562068d8164f8cce0aa8f779faea304669390775436/detection/f-a9d483c0f021b72a94324562068d8164f8cce0aa8f779faea304669390775436-1609464195
linkhttps://www.virustotal.com/gui/file/8483aaf9e1fa5b46486c9f2a14c688c30d2006e88de65d0295a57892de0bf4c9/detection/f-8483aaf9e1fa5b46486c9f2a14c688c30d2006e88de65d0295a57892de0bf4c9-1608093399
linkhttps://www.virustotal.com/gui/file/765327e1dc0888c69c92203d90037c5154db9787f54d3fc8f1097830be8c76ab/detection/f-765327e1dc0888c69c92203d90037c5154db9787f54d3fc8f1097830be8c76ab-1609346253
linkhttps://www.virustotal.com/gui/file/608b5bf065f25cd1c6ac145e3bcdf0b1b6dc742a08e59ec0ce136fe5142774e9/detection/f-608b5bf065f25cd1c6ac145e3bcdf0b1b6dc742a08e59ec0ce136fe5142774e9-1608573561
linkhttps://www.virustotal.com/gui/file/444a6897058fd4965770167b15a2ab13e6fd559a3e6f6cf5565d4d3282587459/detection/f-444a6897058fd4965770167b15a2ab13e6fd559a3e6f6cf5565d4d3282587459-1608285143
linkhttps://www.virustotal.com/gui/file/2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf/detection/f-2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf-1607457856
linkhttps://www.virustotal.com/gui/file/3fd510a3b2e0b0802d57cd5b1cac1e61797d50a08b87d9b5243becd9e2f7073f/detection/f-3fd510a3b2e0b0802d57cd5b1cac1e61797d50a08b87d9b5243becd9e2f7073f-1609359005
linkhttps://www.virustotal.com/gui/file/932778732711cd18d5c4aabc507a65180bf1d4bd2b7d2d4e5506be4b8193596e/detection/f-932778732711cd18d5c4aabc507a65180bf1d4bd2b7d2d4e5506be4b8193596e-1607945507
linkhttps://www.virustotal.com/gui/file/3aad14d200887119f316be71d71aec11735dd3698a4fcaa50902fce71bdccb07/detection/f-3aad14d200887119f316be71d71aec11735dd3698a4fcaa50902fce71bdccb07-1607458180
linkhttps://www.virustotal.com/gui/file/ee06c557f1acd5c4948b1df0413e49f3885f8ac96185a9d986b91a1231444541/detection/f-ee06c557f1acd5c4948b1df0413e49f3885f8ac96185a9d986b91a1231444541-1607652091
linkhttps://www.virustotal.com/gui/file/14e547bebaa738b8605ba4182c4379317d121e268f846c0ed3da171375e65fe4/detection/f-14e547bebaa738b8605ba4182c4379317d121e268f846c0ed3da171375e65fe4-1607607489
linkhttps://www.virustotal.com/gui/file/6ad7b3e0873c9ff122c32006fdc3675706a03c4778287085a020d839b74cd780/detection/f-6ad7b3e0873c9ff122c32006fdc3675706a03c4778287085a020d839b74cd780-1607458285
linkhttps://www.virustotal.com/gui/file/004a2dc3ec7b98fa7fe6ae9c23a8b051ec30bcfcd2bc387c440c07ff5180fe9a/detection/f-004a2dc3ec7b98fa7fe6ae9c23a8b051ec30bcfcd2bc387c440c07ff5180fe9a-1607670660
linkhttps://www.virustotal.com/gui/file/c3c50adcc0a5cd2b39677f17fb5f2efca52cc4e47ccd2cdbbf38815d426be9e1/detection/f-c3c50adcc0a5cd2b39677f17fb5f2efca52cc4e47ccd2cdbbf38815d426be9e1-1607457616
linkhttps://www.virustotal.com/gui/file/3e5a6834cf6192a987ca9b0b4c8cb9202660e399ebe387af8c7407b12ae2da63/detection/f-3e5a6834cf6192a987ca9b0b4c8cb9202660e399ebe387af8c7407b12ae2da63-1607607624
linkhttps://www.virustotal.com/gui/file/3fc382ae51ceca3ad6ef5880cdd2d89ef508f368911d3cd41c71a54453004c55/detection/f-3fc382ae51ceca3ad6ef5880cdd2d89ef508f368911d3cd41c71a54453004c55-1609768843
linkhttps://www.virustotal.com/gui/file/4ea8b8c37cfb02ccdba95fe91c12fb68a2b7174fdcbee7ddaadded8ceb0fdf97/detection/f-4ea8b8c37cfb02ccdba95fe91c12fb68a2b7174fdcbee7ddaadded8ceb0fdf97-1608940897
linkhttps://www.virustotal.com/gui/file/f0adfd3f89c9268953f93bfdfefb84432532a1e30542fee7bddda14dcb69a76c/detection/f-f0adfd3f89c9268953f93bfdfefb84432532a1e30542fee7bddda14dcb69a76c-1609207425

Datetime

ValueDescriptionCopy
datetime2020-12-10T13:44:49+00:00
datetime2021-01-01T01:23:15+00:00
datetime2020-12-16T04:36:39+00:00
datetime2020-12-30T16:37:33+00:00
datetime2020-12-21T17:59:21+00:00
datetime2020-12-18T09:52:23+00:00
datetime2020-12-08T20:04:16+00:00
datetime2020-12-30T20:10:05+00:00
datetime2020-12-14T11:31:47+00:00
datetime2020-12-08T20:09:40+00:00
datetime2020-12-11T02:01:31+00:00
datetime2020-12-10T13:38:09+00:00
datetime2020-12-08T20:11:25+00:00
datetime2020-12-11T07:11:00+00:00
datetime2020-12-08T20:00:16+00:00
datetime2020-12-10T13:40:24+00:00
datetime2021-01-04T14:00:43+00:00
datetime2020-12-26T00:01:37+00:00
datetime2020-12-29T02:03:45+00:00

Text

ValueDescriptionCopy
text59/70
text54/70
text54/69
text55/70
text0/59
text14/60
text60/68
text58/69
text57/69
text55/70
text56/69
text57/70
text57/67
text58/68
text59/70
text55/70
text58/70
text54/69
text25/60
textRSA
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
textmalware-extraction

Threat ID: 68359c9f5d5f0974d01fc07a

Added to database: 5/27/2025, 11:06:07 AM

Last enriched: 12/24/2025, 6:12:36 AM

Last updated: 3/24/2026, 11:59:34 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses