Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1091Replication Through Removable Media
98%
“evolution of usb - borne malware, raspberry robin | huntress due to our extensive and diverse customer base, huntress “ sees ” a good bit of the same malicious activity others are seeing, albeit often from a slightly different perspective. one example of this is, not long ago, hu…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.003Windows Command Shell
93%
“. ico these commands redirect or “ pipe ” the contents of the “ junk ” files into the command processor, denoted by either “ cmd ” or “! comspec! ”. more recently, huntress observed a command line that contained a significant amount of ‘ white space ’ with the command line itself…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1091Replication Through Removable Media
81%
“endpoint windows event logs indicates that the usb device in question was connected to the endpoint repeatedly during january 2023, the earliest observed time being on january 6, 2023. each time the device was connected to the endpoint, windows defender detected the file “ d : \ …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1091Replication Through Removable Media
78%
“been described as a “ usb worm ”, as usb devices are the primary delivery mechanism that has been observed to this point. users interact with a file on a usb device, and then their system becomes infected with the raspberry robin malware. raspberry robin has been seen to be part …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
75%
“/ zjc [. ] bz : 8080. huntress detected the raspberry robin execution pattern. 12 : 23 : 06z windows defender detects downloaded file “ c : \ programdata \ rmbizw \ felgs. evmg ” and submits it to the defender cloud. 12 : 24 : 06z windows defender detects the submitted file as “ …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.003Windows Command Shell
57%
“the command. for example, as with previous commands in the infection process, the command itself is of mixed case, alternating between upper - and lower - case letters. the domain accessed for the resource is most often three characters long, and the top - level domain is two cha…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1518.001Security Software Discovery
55%
“managed edr and managed microsoft defender enables both active defense against threats as they take place and visibility over how these threats appear. as shown in the above example, pivoting from managed av detections can reveal an infection chain, highlighting other touchpoints…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1218.007Msiexec
48%
“the command. for example, as with previous commands in the infection process, the command itself is of mixed case, alternating between upper - and lower - case letters. the domain accessed for the resource is most often three characters long, and the top - level domain is two cha…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1685Disable or Modify Tools
45%
“managed edr and managed microsoft defender enables both active defense against threats as they take place and visibility over how these threats appear. as shown in the above example, pivoting from managed av detections can reveal an infection chain, highlighting other touchpoints…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
A deep dive into the USB-borne Raspberry Robin malware and how Huntress Managed EDR and Managed Antivirus can detect and mitigate this threat.