Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Raccoon (Infostealer) – Malware

June 30, 2023
Reading Time: 3 mins read
in Malware, Types of Malware
Name Raccoon
Additional Names Racealer, RecordBreaker (Raccoon Stealer v2)
Type of Malware Infostealer
Date of Initial Activity 2019
Motivation Steals browser autofill passwords, history, and cookies, credit cards, usernames, passwords, cryptocurrency wallets, and other sensitive data
Attack Vectors Phishing emails, drive-by downloads, or malicious attachments
Targeted System Windows

Overview

Raccoon infostealer was first observed in April 2019. This infostealer targets Windows systems and is sold as a MaaS (Malware-as-a-Service) in underground forums.It is a simple infostealer capable of collecting browser cookies, history, login credentials, crypto currency wallets and credit card information.

Raccoon’s payload is a modular C/C++ binary designed to infect 32-bit and 64-bit systems Windows-based systems. In early 2022, Raccoon’s maintainers shut down operations temporarily due to the impact of the Ukraine war on its members.

However, in June 2022, Raccoon returned with an updated version, including upgraded infrastructure and a completely rebuilt payload.

Targets

Targets Regular Users.

Tools/ Techniques Used

Upon execution, Raccoon checks for the presence of its mutex: %UserName% + “m$V1-xV4v” on the target system to avoid a double infection. If not found, Raccoon creates the mutex, fingerprints the target system, and sends the data to one of its command-and-control (C2) outposts. Raccoon typically uses Telegraph or Discord for C2 operations. Raccon’s C2 host location is obfuscated in the payload using base64 encoding and RC4 encryption.

From there, Raccoon uses the process injection technique to hijack the legitimate explorer.exe process and spawns new processes with elevated privileges. Depending on the target’s system profile, Raccoon imports copies of legitimate Windows DLLs, extracts sensitive information from well-known applications, and follows a standard process for each targeted application.

This process first locates each application’s cache of sensitive information, copies the original cache file to a temporary folder, extracts and encrypts sensitive data from the cache, and finally writes the contents to Raccoon’s main operating directory. For browsers, Raccoon uses sqlite3.dll to query the application’s SQLite database and steals user autologin passwords, credit card data, cookies, and browser history. Some versions of Raccoon can also break TLS encryption under certain conditions allowing Raccoon to effectively man-in-the-middle (MiTM) the infected host’s internet connection.

Notably, some versions of Raccoon check the target’s user language preference identifier and halt operation if Russian, Ukrainian, Belarusian, Kazakh, Kyrgyz, Armenian, Tajik, or Uzbek locations are detected. However, this safety measure to protect certain groups is only sometimes employed.

Raccoon also has custom modules to steal data from the following applications:

  • Cryptocurrency applications: extracts Exodus, Monero, Jaxx, Binance, and others by looking for wallet data files in default locations.
  • Password managers: extracts Bitwarden, 1Password, and LastPass data from their default locations.
  • Email clients: extracts email communications from Outlook, ThunderBird, and Foxmail.
  • Other Applications: extracts Steam gaming platform data, including the Steam Authorisation or Steam Sentry File, as well as Discord, and Telegram account login credentials.

Impact / Significant Attacks

Raccoon has been attributed with hundreds of thousands of infections and is comparable to the prolific Azorult stealer malware in terms of its impact on global cybersecurity.

During its peak, Raccoon was one of the most discussed malware strains on hacker forums, where its operators promote Raccoon and provide client support to cyber criminals.

References

  1. Raccoon Infostealer
  2. Raccoon Stealer 2.0 Malware analysis
  3. Raccoon Stealer returns with a new bag of tricks
Tags: and cookiesCredentialscredit cardscryptocurrency walletshistoryinfostealerMalwaremalware namePasswordsRacealerRecordBreakerSensitive dataTrojanusernames
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Subscribe to our newsletter

    Latest Incidents

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial