Raspberry Robin Malware
Researchers from Red Canary discovered a new worm-like malware that spreads offline, via infected USB drives and linked it to a cluster of malicious activity named Raspberry Robin.
The malware was found in different endpoints in multiple networks belonging to organizations in technology and manufacturing industries.
Its been discovered that the worm spreads to new devices via a malicious .LNK file. Once the victim plugs in the USB drive, the worm will trigger a new process through cmd.exe, and run the file.
The worm uses Microsoft Standard Installer (msiexec.exe) to communicate to its C2 server.They speculate the server is hosted on a compromised QNAP device, with TOR exit nodes being used as extra C2 infrastructure.
While msiexec.exe downloads and executes legitimate installer packages, adversaries also leverage it to deliver malware Raspberry Robin uses msiexec.exe to attempt external network communication to a malicious domain for C2 purposes.
Even though Red Canary analysts examined closely what the newly discovered malware does on infected systems, but, there are several questions still remaining. Malwarecoperators’ goal remains an unanswered question since there is no information about end-stage malicious tasks
1 thought on “Raspberry Robin Malware”