Malicious downloader Raspberry Robin with new updates

September 22, 2025

The malware receives improved obfuscation methods, network encryption conversion, and a new exploit for local privilege escalation. Raspberry Robin, also known as Roshtyak, is an advanced malware downloader that has been actively attacking systems since 2021 and spreads mainly via infected USB devices. The malware is still active and is continuously being developed to evade detection. Zscaler’s ThreatLabz team has compiled the malware’s updates and obfuscation techniques.

Its main task is to download and execute payloads on a compromised host.

New obfuscation tactics

The Raspberry Robin developers have improved the malware’s obfuscation methods by adding multiple initialisation loops to the function flow, making brute force decryption more difficult. In addition, Raspberry Robin now uses obfuscated stack pointers. This technique disrupts the IDA decompilation process. As a result, the decompilation function fails and security analysts have to manually correct the function stack. Obfuscation of conditional statements further complicates the analysis of Raspberry Robin’s logic during code analysis.

In addition, changes have been made to network communication. Raspberry Robin now uses the ChaCha-20 algorithm instead of AES-CTR to encrypt network data. While the 32-byte key is hard-coded in the binary file, the counter and nonce values are randomly generated for each request. The CRC-64 algorithm has not been changed, but the initial values are now also randomly generated for each campaign.

Raspberry Robin has also updated its method for embedding deliberately damaged TOR onion domains. In early 2024, the downloader received a hard-coded algorithm in its TOR module to dynamically correct decrypted C2 domains. This part of the code was modified at the beginning of 2025 and is now also adjusted with each campaign.

In addition, a new local privilege escalation (LPE) exploit (CVE-2024-38196) has been added to the malware to gain elevated privileges on target systems.

Conclusion

Raspberry Robin is still active and now uses updated obfuscation techniques, encryption methods and tactics to avoid detection and make reverse engineering analysis more difficult. Due to its continuous improvements, the downloader continues to pose a significant threat to security teams. To detect the malware early and prevent major damage, we recommend a multi-layered cloud security platform with an integrated cloud sandbox that detects indicators of the malware at various levels.

A detailed analysis of all updates to the Raspberry Robin malware can be found in the Zscaler blog.

Related Articles

Focus on the importance of cooperation and innovation

Herrmann at the Security and Innovation Forum at Friedrich-Alexander University Erlangen-Nuremberg At the Security and Innovation Forum at Friedrich-Alexander University Erlangen-Nuremberg (FAU) on Monday, Bavaria's Interior Minister Joachim Herrmann emphasised the...

Airbus’ OneSat selected for Oman’s first satellite

Space Communication Technologies (SCT), Oman's national satellite operator, has awarded Airbus Defence and Space a contract for OmanSat-1, a state-of-the-art, fully reconfigurable, high-throughput OneSat telecommunications satellite, including the associated system....

Black Friday: Half go bargain hunting

On average, 312 euros are spent – around 11 per cent more than last year Online shops from China polarise opinion: half avoid them, the other half have already ordered from them Four out of ten young people would send AI shopping on its own When Black Friday and the...

Share This