Raspberry Robin

MITRE
Tipo Malware:
Other
Prima attivita:
Unknown
Ultima attivita:
Unknown
Dettagli:

[Raspberry Robin](https://attack.mitre.org/software/S1130) is initial access malware first identified in September 2021, and active through early 2024. The malware is notable for spreading via infected USB devices containing a malicious LNK object that, on execution, retrieves remote hosted payloads for installation. [Raspberry Robin](https://attack.mitre.org/software/S1130) has been widely used against various industries and geographies, and as a precursor to information stealer, ransomware, and other payloads such as [SocGholish](https://attack.mitre.org/software/S1124), [Cobalt Strike](https://attack.mitre.org/software/S0154), [IcedID](https://attack.mitre.org/software/S0483), and [Bumblebee](https://attack.mitre.org/software/S1039).(Citation: TrendMicro RaspberryRobin 2022)(Citation: RedCanary RaspberryRobin 2022)(Citation: HP RaspberryRobin 2024) The DLL componenet in the [Raspberry Robin](https://attack.mitre.org/software/S1130) infection chain is also referred to as "Roshtyak."(Citation: Avast RaspberryRobin 2022) The name "Raspberry Robin" is used to refer to both the malware as well as the threat actor associated with its use, although the Raspberry Robin operators are also tracked as <code>Storm-0856</code> by some vendors.(Citation: Microsoft RaspberryRobin 2022)

Tecniche Associate (41)
ID ATT&CK Tattiche
T1027 Obfuscated Files or Information -
T1027.002 Software Packing -
T1033 System Owner/User Discovery -
T1036.004 Masquerade Task or Service -
T1036.008 Masquerade File Type -
T1047 Windows Management Instrumentation -
T1055.012 Process Hollowing -
T1057 Process Discovery -
T1059 Command and Scripting Interpreter -
T1059.003 Windows Command Shell -
T1070.004 File Deletion -
T1070.009 Clear Persistence -
T1071 Application Layer Protocol -
T1071.001 Web Protocols -
T1082 System Information Discovery -
Metadata
ID: 210
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00