Inside RasCorp Group: Tracing a Ransomware Alliance within THE PERSEPHONE Network
![]() |
Ransomware operations rarely function as isolated entities. In many cases, they emerge through loosely organized networks where individuals contribute different capabilities, ranging from malware development and infrastructure management to recruitment and operational coordination. Communication platforms such as Telegram have increasingly become central to these ecosystems, allowing actors to promote tools, recruit collaborators, and coordinate activities across dispersed communities.
During routine monitoring of Telegram discussions related to hacking and cybercrime, references to a group identifying itself as RasCorp Group, also described as the Ransomware Corporation Group, began to surface across several channels. Initial observations suggested that the group was actively promoting itself as a ransomware-focused operation while seeking individuals with expertise in malware development, networking, and infrastructure management.
At first glance, RasCorp appeared to operate primarily through Telegram-based communication channels where announcements, recruitment messages, and partnership statements were shared. However, further examination revealed that the group’s activities were not limited to a single channel or actor. Mentions of RasCorp appeared alongside references to other cyber groups and tooling developers, hinting at a broader network of collaborators operating within the same environment.
This raised important questions about the structure and capabilities of RasCorp: was the group simply promoting itself as a ransomware collective, or was it part of a larger ecosystem involving multiple actors and supporting tools? To answer this, the investigation focused on mapping the Telegram channels, identifying the key personas involved, and examining how RasCorp positioned itself within a wider network of cyber actors.
Incident Trigger and Initial Investigation
The investigation into RasCorp Group originated during the earlier analysis of THE PERSEPHONE platform, which revealed a collaborative environment involving multiple actors. While examining the structure of the Persephone website and the groups referenced within it, RasCorp Group appeared alongside VFVCT and ClayRat, suggesting that the platform was supported by more than one organization operating within the same ecosystem.
To better understand RasCorp’s role within this alliance, further analysis was conducted using StealthMole’s Telegram Tracker, which indexes conversations and activity across Telegram channels commonly used by cyber actors. Searching for references to “RasCorp” revealed several messages across different channels, including those already linked to VFVCT. These messages included recruitment announcements, partnership statements, and references to dedicated RasCorp communication channels.
![]() |
One such announcement described a strategic alliance between three groups: CrackRat Zone Clay, RasCorp Group, and VFVCT (V For Vendetta Cyber Team). The message outlined the intended roles of each participant, presenting CrackRat Zone Clay as developers of multifunctional tools, RasCorp as responsible for business operations and coordination, and VFVCT as contributing operational and strategic capabilities.
![]() |
The announcement also listed the Telegram channel associated with RasCorp:
- https://t.me/rascorp************n
Because this channel appeared to serve as a central communication hub for the group, it became the starting point for deeper investigation into RasCorp’s structure, the individuals involved in managing the channel, and the activities promoted within its ecosystem.
RasCorp Communication Channels and Recruitment Activity
Following the identification of the RasCorp Telegram channel, further examination focused on understanding how the group used the platform to promote its activities and interact with potential collaborators. The channel https://t.me/rascorp********n, titled RascorpBusinessGentlemen, appeared to function as the primary communication hub for the group.
![]() |
The channel description referenced RasCorp Group and included a contact bot, @Rascor***t, indicating that the platform was intended to facilitate direct interaction with individuals interested in the group’s operations. Posts within the channel and related discussions revealed that RasCorp actively promoted recruitment efforts, inviting individuals with technical expertise to participate in ransomware-related activities.
![]() |
One recruitment message circulated within associated Telegram discussions stated that the group was seeking members with skills in malware development, networking, infrastructure management, and scripting, particularly those experienced with ransomware operations. The message also directed interested individuals to contact specific Telegram accounts for further discussion. Among the listed contacts were @jd*****929, identified as a RasCorp administrator, and @clay*****es, described as a business lead associated with the group.
In addition to the RasCorp channel itself, the recruitment messages referenced other channels connected to the alliance, including CrackRat Zone Clay (https://t.me/cr********y) and the VFVCT backup channel. These references indicated that RasCorp operated within a network of interconnected Telegram channels rather than relying on a single communication point.
The recruitment messaging and channel structure suggested that RasCorp was attempting to position itself as an organized ransomware operation capable of attracting collaborators with specialized skills. By maintaining Telegram channels and automated contact mechanisms, the group appeared to be building a communication infrastructure designed to facilitate coordination and expansion of its activities within the broader cyber underground.
Identifying Key Personas within RasCorp
Further analysis of the RasCorp Telegram channel led to the identification of several accounts associated with the group’s operations. One of the most prominent personas was the Telegram user @jd********929, who appeared to play an administrative role within the RasCorp ecosystem.
![]() |
Using StealthMole’s historical indexing capabilities, the account’s previous profile data was examined to understand its activity over time. Historical records showed that the account had changed its username and profile images multiple times, indicating periodic efforts to modify its online identity.
![]() |
Earlier identifiers linked to the account included the username @so******01, observed in records from October 2025, where the profile image depicted a hooded figure commonly associated with hacker-themed imagery. In earlier records from January 2025, the account used the username @Va*****92, accompanied by a profile image showing a screenshot of a website defacement page.
![]() |
The defacement image referenced a message attributed to Cyber Virus, displaying text indicating that a website had been encrypted by the attacker. While the context of the image could not be independently verified, its presence within the account’s historical profile suggested an association with hacking or defacement-related communities.
Additional examination of the account’s activity across Telegram revealed participation in several unrelated channels. In one community, the user discussed bringing experienced individuals into a ransomware team, further reinforcing the account’s apparent involvement in RasCorp’s recruitment efforts. In other channels, the account engaged in discussions about credential lists and online account combinations, including requests for Eneba account combos.
![]() |
Overall, the account’s historical identity changes, hacking-themed imagery, and recruitment-related messaging suggested that @jd******929 was likely an active participant in RasCorp’s Telegram ecosystem, potentially contributing to the group’s efforts to recruit collaborators and promote ransomware-related activities.
Links to ClayRat Tooling
During the analysis of RasCorp’s Telegram ecosystem, additional connections emerged linking the group to an actor operating under the username @clay******s. This account had already been referenced in recruitment announcements associated with RasCorp and VFVCT, where it was described as a business lead involved in the alliance. To better understand this role, further investigation was conducted into the activity and historical identifiers associated with the account.
![]() |
StealthMole’s historical indexing revealed that the account previously operated under the username @cr****t, recorded in January 2026, and displayed the name GhostDroid in earlier records. The earlier username appeared to reference RAT (Remote Access Trojan) tooling, which prompted further examination of the account’s activity across Telegram channels.
![]() |
Monitoring the account’s activity showed that @clay**********s was particularly active in a community channel titled OFFICIAL YASHVIR GAMING CHAT. Within this channel, the user frequently shared images and discussions related to a tool referred to as G-700 RAT. Screenshots circulated by the user appeared to show an operator interface for the tool, including panels for managing clients and controlling various functions typically associated with remote access malware.
![]() |
In addition to promoting the RAT tool, the user also posted messages announcing the launch of the G-700 RAT, indicating that the tool was being introduced or distributed within the community. Other messages attributed to the account referenced credential data, including offers to provide NowTV account logs, suggesting involvement in credential-sharing or data trading discussions commonly observed within underground communities.
![]() |
![]() |
The presence of the @clay**********s account within both RasCorp recruitment announcements and channels discussing RAT tooling highlighted the role of specialized tooling within the broader ecosystem. Rather than operating as an isolated developer, the account appeared to occupy a position where malware promotion, credential-related discussions, and collaboration with RasCorp and VFVCT intersected within the same Telegram environment.
Operational Structure and Alliance Dynamics
The artifacts identified during the investigation suggest that RasCorp Group does not operate in isolation but instead forms part of a broader collaborative structure involving multiple actors with complementary roles. Messages circulated across the Telegram channels referenced an operational alliance between RasCorp, VFVCT, and CrackRat Zone Clay, describing the partnership as a coordinated effort combining different capabilities within the cyber ecosystem.
According to the announcement observed during the investigation, each participant in the alliance appeared to contribute a distinct role. CrackRat Zone Clay was described as providing advanced multifunctional tools, while RasCorp Group was positioned as responsible for business operations and coordination. Meanwhile, VFVCT (V For Vendetta Cyber Team) was presented as contributing strategic and operational capabilities. This distribution of responsibilities suggested an attempt to structure the collaboration in a way that combined technical tooling, operational planning, and organizational coordination.
The presence of separate Telegram channels for each group, along with cross-references between them, reinforced the idea that these actors were operating within a shared ecosystem rather than as independent entities. Recruitment messages circulated within the network frequently directed interested individuals toward RasCorp contacts, while tooling-related announcements were associated with channels connected to CrackRat Zone Clay.
![]() |
This structure indicates that the alliance was designed to integrate different functions of cyber operations, from tool development and recruitment to operational coordination. Within this arrangement, RasCorp appeared to position itself as a coordinating entity responsible for managing relationships and facilitating collaboration among participants within the broader network.
Conclusion
The activity surrounding RasCorp Group illustrates how ransomware-oriented operations can emerge within loosely structured online ecosystems rather than through a single centralized organization. The group’s presence across Telegram channels, recruitment announcements, and alliance messaging suggests an effort to position RasCorp as a coordinating entity capable of attracting collaborators with different technical capabilities. By presenting itself as responsible for the “business” and coordination aspects of operations, RasCorp appears to focus on building relationships and organizing participants rather than developing tools or conducting attacks independently.
At the same time, the connections identified with actors involved in malware tooling and credential trading highlight how such ecosystems often overlap with broader underground communities. Individuals active in hacking forums, gaming chats, and credential-sharing spaces can gradually transition into more organized cyber operations, bringing with them both tools and contacts from those environments. Within this context, RasCorp’s recruitment messaging and alliance formation may represent an attempt to formalize these relationships into a more structured ransomware-oriented collaboration.
Viewed in this light, RasCorp is less notable for a specific attack or dataset and more significant as an example of how cyber groups attempt to organize themselves in the early stages of operation. Monitoring these emerging networks, particularly those built around recruitment and partnerships, can provide valuable insight into how future ransomware or cybercrime campaigns may develop.
Editorial Note
Investigations into cyber actors operating across online communities rarely provide complete visibility into every aspect of their operations. Identities, infrastructure, and affiliations can change quickly, and participants may intentionally obscure their roles within collaborative networks. For this reason, attribution should be treated as an evolving assessment rather than a definitive conclusion. This case demonstrates how StealthMole’s monitoring capabilities can help trace connections between actors, communication channels, and tools across different layers of the cyber ecosystem, gradually revealing how such alliances take shape.
To access the unmasked report or full details, please reach out to us separately.
Contact us: support@stealthmole.com
Labels: Featured, Hacktivist Group















































