Raccoon Stealer: Fast-Spreading Infostealer-as-a-Service with Credential and Wallet Theft

Raccoon Stealer is a Windows-based information stealer that harvests credentials, browser data, crypto wallets, and system information. First appearing in 2019, it quickly became popular in cybercriminal circles due to its ease of use, rental-based model, and consistent updates. Raccoon is typically deployed through phishing emails, malicious websites, and loaders like Smoke Loader and Amadey, and is used in large-scale data harvesting campaigns.

Introduction to Raccoon Stealer

Raccoon is a key player in the malware-as-a-service (MaaS) ecosystem, giving attackers access to a control panel where they can manage infections, view stolen data, and update configurations. It targets data stored in web browsers, email clients, cryptocurrency wallets, and common applications, packaging it and sending it to a command-and-control (C2) server. Despite temporary shutdowns, Raccoon has returned in new versions, remaining a widely used tool in info-theft operations.


1. How Raccoon Stealer Works

Infection Mechanism:
Raccoon Stealer is spread through:

Payload Execution:
Once active, Raccoon:


2. History and Notable Campaigns

Origin and Discovery:
Raccoon was first observed in early 2019, quickly gaining attention for its user-friendly backend and low price (approx. $75/week or $200/month). Its development is believed to be linked to Russian-speaking threat actors.

Notable Campaigns:


3. Targets and Impact

Targeted Victims and Sectors:

Consequences:


4. Technical Details

Payload Capabilities:

Evasion Techniques:


5. Preventing Raccoon Stealer Infections

Best Practices:

Recommended Security Tools:


6. Detecting and Removing Raccoon Stealer

Indicators of Compromise (IoCs):

Removal Steps:

  1. Scan the system with an updated antivirus or EDR solution
  2. Remove malicious files and disable persistence entries
  3. Reset all credentials and enable MFA on all accounts
  4. Notify affected platforms or users of any data breach
  5. Monitor logs for signs of secondary infections

Professional Help:
If browser sessions, corporate accounts, or financial platforms were compromised, consider digital forensics or identity protection services.


7. Response to a Raccoon Stealer Infection

Immediate Steps:


8. Legal and Ethical Implications

Legal Considerations:
Stolen data may include personal or corporate credentials subject to data protection laws like GDPR or CCPA. Organizations may be required to report breaches depending on the type of data exfiltrated.

Ethical Considerations:
Raccoon Stealer plays a central role in data commodification, making it easier for criminals to profit from identity theft. Its ease of use and affordability lower the barrier for abuse, turning average users into viable targets.


9. Resources and References


10. FAQs about Raccoon Stealer

Q: What is Raccoon Stealer?
A malware-as-a-service info-stealer that harvests passwords, cookies, and crypto wallets from Windows systems. It is also known as Mohazo or Racealer.

Q: How does it infect users?
Via phishing emails, malicious ads, or bundled with other malware like Amadey.

Q: What data does it target?
Browser-stored credentials, autofill data, crypto wallets, and app credentials.

Q: Is it still active?
Yes. Despite takedown efforts, Raccoon re-emerged with version 2.0 and remains in use.


11. Conclusion

Raccoon Stealer is a fast, flexible infostealer that exemplifies the malware-as-a-service trend. It has helped thousands of attackers compromise systems with minimal skill and continues to evolve despite law enforcement efforts. Defending against it means using good security hygiene, disabling browser password storage, and deploying modern detection tools that catch threats before they steal sensitive data.

 

 

« Back to the Virus Information Library

« Back to the Security Center