- If ChatGPT produces AI-generated code for your app, who does it really belong to?
- The best iPhone power banks of 2024: Expert tested and reviewed
- The best NAS devices of 2024: Expert tested
- Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses
- I converted this Windows 11 Mini PC into a Linux workstation - and didn't regret it
Raspberry Robin Distributed Through Windows Script Files
Threat actors distributing Raspberry Robin now use Windows Script Files (WSF) to spread the worm alongside other methods, such as USB drives.
HP Threat Research identified new campaigns starting in March 2024 in which Raspberry Robin was spread through highly obfuscated Windows Script Files, using anti-analysis techniques.
Raspberry Robin is a Windows worm first discovered in 2021. Initially, threat actors relying on the worm spread it to target hosts using removable media like USB drives.
Over the years, threat actors have used other attack vectors, including archive files (.rar, .zip) and malicious adverts, to deliver the worm.
In March, hackers started spreading it through Windows Script Files, a file type generally used by administrators and legitimate software to automate tasks within Windows.
They shared their findings in a report published on April 10, 2024.
Decoding Raspberry Robin’s WSF Distribution
The .wsf file format supports scripting languages, such as JScript and VBScript, that are interpreted by the Windows Script Host component built into the Windows operating system.
The Windows Script Files are offered for download via various malicious domains and subdomains controlled by the attackers.
Although it is unclear how threat actors lure users to the malicious URLs, HP threat researchers believe this could be via spam or malvertising campaigns.
The script file acts as a downloader and uses various anti-analysis and virtual machine (VM) detection techniques.
The final payload is only downloaded and executed when all these evaluation steps indicate that the malware is running on a real device, rather than in a sandbox.
The malware also checks for the following security software vendors:
- Kaspersky
- ESET
- Avast
- Avira
- Check Point
- Bitdefender
The researchers assessed that, at the time of analysis, no anti-virus scanners on VirusTotal classified those files as malicious, demonstrating the malware’s evasiveness.
“The WSF downloader is heavily obfuscated and uses many anti-analysis and anti-VM techniques, enabling the malware to evade detection and slow down analysis. This is particularly concerning given that Raspberry Robin has been used as a precursor for human-operated ransomware. Countering this malware early on in its infection chain should be a high priority for security teams,” the researchers concluded.