Raspberry Robin Malware Shifts Tactics, Spreads via Windows Script Files to Evade Detection
The operators behind the Raspberry Robin malware distribution platform have evolved their tactics, now leveraging Windows Script Files (.wsf) to infect systems in a way that evades detection and makes analysis more difficult.
Table of Contents
Background on Raspberry Robin Malware
USB drives, malicious ads, and now Windows Script Files were the first sources of infection - Execution/persistence using Windows Installer, LNK files, DLLs, and scripts
- A precursor to malware such as Cobalt Strike, SocGholish, IcedID, and ransomware
- To download additional payloads, command and control communication is required
Transition to Stealthy .WSF File Infections
- JScript and VBScript can be mixed in.WSF files for flexible code execution
Runtime decoding of encoded functions/variablesScripts are made evasive by obfuscation techniques: - Code that obfuscates control flow and self-destructs
- To avoid detection, check for sandboxes and virtual environments
- Bypasses antivirus when downloading payloads using exceptions
Many security controls designed for executable malware are bypassed Analysts struggle to reverse engineer and understandIts native execution through Windows Script Host makes Raspberry Robin a common precursor to ransomware attacks. Raspberry Robin is a modular malware ecosystem first revealed by Red Canary in 2022. Among the key characteristics are: - The first sources of infection were USB drives, malicious ads, and now Windows Script Files
- Scripts, LNK files, DLLs, and Windows Installer for execution/persistence
- Cobalt Strike, SocGholish, IcedID, and ransomware are precursors to this type of malware
- Command and control communication is required to download additional payloads
In-Depth Technical Analysis of the.WSF Attack Flow
A script file is executed on the target system, evading antivirus protection by using exceptions - To avoid sandboxes and analysis, environment checks are run
- Extraction and decryption of encoded C2 server URLs
- Downloaded malicious Raspberry Robin DLL from C2 and saved it to disk
- A script host executes a DLL, infecting the machine and enabling further payloads to execute
Defending Against This Emerging Script Malware Threat
Detecting obfuscated scripts by updating antivirus and endpoints - System monitoring for suspicious script execution and traffic
- Identifying malware by analyzing scripts in sandboxes
- Hardening systems to mitigate vulnerabilities according to best practices
- Script-based attacks: user education