In-depth analysis of Raccoon Stealer v2 🔬

Following SEKOIA.IO's investigations on the new version of the information stealer Raccoon, we published an in-depth analysis to describe the malware capabilities. Raccoon Stealer v2 has been completely rewritten from scratch, so we have detailed each step of its execution, obfuscation techniques and communications. This publication follows another report in which we shared our findings from the Dark Web monitoring and tracking of this threat.

raccoon_stealing_wallets_and_bitcoin.jpeg

Our investigations on Raccoon Stealer lead to actionable cyber threat intelligence activated that enables SEKOIA.IO XDR and our clients to detect this popular threat. Indicators of Compromise (IoCs) can be found in the Intelligence Center in the Raccoon malware page.

Related resources:

What do you think about this update?