Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Raccoon (Infostealer) – Malware

June 30, 2023
Reading Time: 3 mins read
in Malware, Types of Malware
Name Raccoon
Additional Names Racealer, RecordBreaker (Raccoon Stealer v2)
Type of Malware Infostealer
Date of Initial Activity 2019
Motivation Steals browser autofill passwords, history, and cookies, credit cards, usernames, passwords, cryptocurrency wallets, and other sensitive data
Attack Vectors Phishing emails, drive-by downloads, or malicious attachments
Targeted System Windows

Overview

Raccoon infostealer was first observed in April 2019. This infostealer targets Windows systems and is sold as a MaaS (Malware-as-a-Service) in underground forums.It is a simple infostealer capable of collecting browser cookies, history, login credentials, crypto currency wallets and credit card information.

Raccoon’s payload is a modular C/C++ binary designed to infect 32-bit and 64-bit systems Windows-based systems. In early 2022, Raccoon’s maintainers shut down operations temporarily due to the impact of the Ukraine war on its members.

However, in June 2022, Raccoon returned with an updated version, including upgraded infrastructure and a completely rebuilt payload.

Targets

Targets Regular Users.

Tools/ Techniques Used

Upon execution, Raccoon checks for the presence of its mutex: %UserName% + “m$V1-xV4v” on the target system to avoid a double infection. If not found, Raccoon creates the mutex, fingerprints the target system, and sends the data to one of its command-and-control (C2) outposts. Raccoon typically uses Telegraph or Discord for C2 operations. Raccon’s C2 host location is obfuscated in the payload using base64 encoding and RC4 encryption.

From there, Raccoon uses the process injection technique to hijack the legitimate explorer.exe process and spawns new processes with elevated privileges. Depending on the target’s system profile, Raccoon imports copies of legitimate Windows DLLs, extracts sensitive information from well-known applications, and follows a standard process for each targeted application.

This process first locates each application’s cache of sensitive information, copies the original cache file to a temporary folder, extracts and encrypts sensitive data from the cache, and finally writes the contents to Raccoon’s main operating directory. For browsers, Raccoon uses sqlite3.dll to query the application’s SQLite database and steals user autologin passwords, credit card data, cookies, and browser history. Some versions of Raccoon can also break TLS encryption under certain conditions allowing Raccoon to effectively man-in-the-middle (MiTM) the infected host’s internet connection.

Notably, some versions of Raccoon check the target’s user language preference identifier and halt operation if Russian, Ukrainian, Belarusian, Kazakh, Kyrgyz, Armenian, Tajik, or Uzbek locations are detected. However, this safety measure to protect certain groups is only sometimes employed.

Raccoon also has custom modules to steal data from the following applications:

  • Cryptocurrency applications: extracts Exodus, Monero, Jaxx, Binance, and others by looking for wallet data files in default locations.
  • Password managers: extracts Bitwarden, 1Password, and LastPass data from their default locations.
  • Email clients: extracts email communications from Outlook, ThunderBird, and Foxmail.
  • Other Applications: extracts Steam gaming platform data, including the Steam Authorisation or Steam Sentry File, as well as Discord, and Telegram account login credentials.

Impact / Significant Attacks

Raccoon has been attributed with hundreds of thousands of infections and is comparable to the prolific Azorult stealer malware in terms of its impact on global cybersecurity.

During its peak, Raccoon was one of the most discussed malware strains on hacker forums, where its operators promote Raccoon and provide client support to cyber criminals.

References

  1. Raccoon Infostealer
  2. Raccoon Stealer 2.0 Malware analysis
  3. Raccoon Stealer returns with a new bag of tricks
Tags: and cookiesCredentialscredit cardscryptocurrency walletshistoryinfostealerMalwaremalware namePasswordsRacealerRecordBreakerSensitive dataTrojanusernames
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial