The Raccoon campaign successfully deployed other malware, stole cookies and credentials, and sold them illegally to steal cryptocurrency worth around $13,200.
After infection, additional malware delivered to victims include cryptominers, clippers, malicious browser extensions, YouTube click-fraud bots, and Djvu/Stop ransomware.
The selection of dropped malware indicates that these are part of the droppers-as-a-service used by some of its affiliates, and may not be associated directly with the Racoon Stealer operators.
Packaging cracked software for malicious purposes is not new. Besides, the recent update of Raccoon Stealer shows that the cyber threat landscape is now becoming commercialized. The availability of malicious tools and services has become easier than ever before, which has resulted in a drastic increase in cybercrime across the globe.