Malicious downloader Raspberry Robin with new updates

September 22, 2025

The malware receives improved obfuscation methods, network encryption conversion, and a new exploit for local privilege escalation. Raspberry Robin, also known as Roshtyak, is an advanced malware downloader that has been actively attacking systems since 2021 and spreads mainly via infected USB devices. The malware is still active and is continuously being developed to evade detection. Zscaler’s ThreatLabz team has compiled the malware’s updates and obfuscation techniques.

Its main task is to download and execute payloads on a compromised host.

New obfuscation tactics

The Raspberry Robin developers have improved the malware’s obfuscation methods by adding multiple initialisation loops to the function flow, making brute force decryption more difficult. In addition, Raspberry Robin now uses obfuscated stack pointers. This technique disrupts the IDA decompilation process. As a result, the decompilation function fails and security analysts have to manually correct the function stack. Obfuscation of conditional statements further complicates the analysis of Raspberry Robin’s logic during code analysis.

In addition, changes have been made to network communication. Raspberry Robin now uses the ChaCha-20 algorithm instead of AES-CTR to encrypt network data. While the 32-byte key is hard-coded in the binary file, the counter and nonce values are randomly generated for each request. The CRC-64 algorithm has not been changed, but the initial values are now also randomly generated for each campaign.

Raspberry Robin has also updated its method for embedding deliberately damaged TOR onion domains. In early 2024, the downloader received a hard-coded algorithm in its TOR module to dynamically correct decrypted C2 domains. This part of the code was modified at the beginning of 2025 and is now also adjusted with each campaign.

In addition, a new local privilege escalation (LPE) exploit (CVE-2024-38196) has been added to the malware to gain elevated privileges on target systems.

Conclusion

Raspberry Robin is still active and now uses updated obfuscation techniques, encryption methods and tactics to avoid detection and make reverse engineering analysis more difficult. Due to its continuous improvements, the downloader continues to pose a significant threat to security teams. To detect the malware early and prevent major damage, we recommend a multi-layered cloud security platform with an integrated cloud sandbox that detects indicators of the malware at various levels.

A detailed analysis of all updates to the Raspberry Robin malware can be found in the Zscaler blog.

Related Articles

Germany’s first AI factory for industry goes into operation in Munich

Industrial AI infrastructure as a building block of digital sovereignty With the official launch of the Industrial AI Cloud in Munich, Deutsche Telekom is setting an important milestone in industrial policy. In cooperation with NVIDIA and data centre partner Polarise,...

Comforting words from AI are often better received

Desired partners in crises perform worse in extensive scientific test series Although people prefer compassion that comes from other humans, they find the empathy communicated by artificial intelligence (AI) to be more effective. This was discovered by researchers at...

Share This