Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms
Common Information
Type Value
UUID 9f8a42b5-ffce-4734-accb-312f22092a6b
Fingerprint 3bd159516db08f09
Analysis status DONE
Considered CTI value 0
Text language
Published Nov. 19, 2024, 5:15 p.m.
Added to db Nov. 19, 2024, 6:56 p.m.
Last updated Dec. 3, 2024, 4:21 p.m.
Headline Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms
Title Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms
Detected Hints/Tags/Attributes 110/3/79
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 158 Malware Analysis, News and Indicators - Latest topics https://malware.news/latest.rss 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 8
cve-2024-26229
Details CVE 4
cve-2021-31969
Details Domain 2
pointers.to
Details Domain 2
minutes.read
Details Domain 2
base64.as
Details Domain 2
variable.as
Details Domain 2
it.network
Details Domain 2
true.it
Details Domain 2
paexec.windows
Details Domain 2
classes.as
Details Domain 2
ntwow64queryinformationprocess64.network
Details Domain 2
independently.next
Details Domain 2
respectively.in
Details Domain 2
wow64.windows
Details Domain 2
name.java
Details Domain 2
monitor.to
Details Domain 4
3bh22ezbxub3dopbqja7jjymdussvwgl3eu4xzlsdyagtnhzxy3tr3id.onion
Details Domain 4
3zs4zdszo3lesutdbuenzvlspuh6wljj6eyntv73dxxig3bk2wcskrad.onion
Details Domain 4
4jtsmu3u4yrbehjf4rzfwsswhpc7ohs4nrfnlfu3xebteeaf4uv3okyd.onion
Details Domain 4
4rnzfvzybry65auecpi3n67c6ynuunvs77qpk45svyhhsj6oisibk3qd.onion
Details Domain 4
5bqxmurmtkqlzis65uu22aspcuhivb6vpzpcpma5wfl5ngz2ha6oxzqd.onion
Details Domain 4
64iahnunyhf6ph6qvakjp22a3j6wlvl4sdmbh6elwri6up5gpnm7xkyd.onion
Details Domain 4
6agzykvu3rjnwpdnky777ffxb5dj4fiemftho4tsoeakp2xa542pj7id.onion
Details Domain 4
6kykjg6h7sjqru5puc57mb2nhd2bwhtewdswnsg4rlr3rw6t4iqrpgyd.onion
Details Domain 4
6praos6qyi3b5kcurfqe4kyh5ihu4k3z6mjbggkixnfyhbpomy5szoad.onion
Details Domain 4
6s75xlg3auzdnccos4re4hrmcxyg6fivxsqm3cldv2gowl2engljtqyd.onion
Details File 2
exploits.key
Details File 2
sections.exe
Details File 2
layer.exe
Details File 2
layer.tab
Details File 2
detected.tab
Details File 2
username.exe
Details File 2
name.inf
Details File 2
different.core
Details File 3
cbsmsg.dll
Details File 472
regsvr32.exe
Details File 179
dllhost.exe
Details File 37
hh.exe
Details File 280
msiexec.exe
Details File 111
regasm.exe
Details File 1275
explorer.exe
Details File 2
below.log
Details File 122
avp.exe
Details File 1040
rundll32.exe
Details File 192
shell32.dll
Details File 58
control.exe
Details File 4
efsui.exe
Details File 4
properties.pl
Details File 2
name.pl
Details File 2
file.pl
Details File 14
iexpress.exe
Details File 3
network_info_list.txt
Details File 79
netsh.exe
Details File 2
namelauncher.sys
Details File 4
runlegacycplelevated.exe
Details File 17
advpack.dll
Details File 15
cleanmgr.exe
Details File 3
random_generated_string.chm
Details File 7
aswhook.dll
Details File 2
level.sys
Details File 2
name.java
Details IPv4 50
127.0.0.0
Details IPv4 137
10.0.0.0
Details IPv4 30
224.0.0.0
Details IPv4 16
240.0.0.0
Details IPv4 85
172.16.0.0
Details IPv4 130
192.168.0.0
Details Url 2
https://2pxsdtxngssu3vqqujdfgu4bsmlkp3d2ytctawznlhhez6tq57wzpzqd.onion:55314/command-and-control
Details Url 2
https://3bh22ezbxub3dopbqja7jjymdussvwgl3eu4xzlsdyagtnhzxy3tr3id.onion:3367/c2
Details Url 2
https://3zs4zdszo3lesutdbuenzvlspuh6wljj6eyntv73dxxig3bk2wcskrad.onion:15842/c2
Details Url 2
https://4jtsmu3u4yrbehjf4rzfwsswhpc7ohs4nrfnlfu3xebteeaf4uv3okyd.onion:37151/c2
Details Url 2
https://4rnzfvzybry65auecpi3n67c6ynuunvs77qpk45svyhhsj6oisibk3qd.onion:39567/c2
Details Url 2
https://5bqxmurmtkqlzis65uu22aspcuhivb6vpzpcpma5wfl5ngz2ha6oxzqd.onion:18231/c2
Details Url 2
https://64iahnunyhf6ph6qvakjp22a3j6wlvl4sdmbh6elwri6up5gpnm7xkyd.onion:33960/c2
Details Url 2
https://6agzykvu3rjnwpdnky777ffxb5dj4fiemftho4tsoeakp2xa542pj7id.onion:34024/c2
Details Url 2
https://6kykjg6h7sjqru5puc57mb2nhd2bwhtewdswnsg4rlr3rw6t4iqrpgyd.onion:13392/c2
Details Url 2
https://6praos6qyi3b5kcurfqe4kyh5ihu4k3z6mjbggkixnfyhbpomy5szoad.onion:4123/c2
Details Url 2
https://6s75xlg3auzdnccos4re4hrmcxyg6fivxsqm3cldv2gowl2engljtqyd.onion:58212/c2
Details Windows Registry Key 2
HKEY_CURRENT_USER\Software\Classes.Attempts