StealC malware

Stealc is a stealer malware that targets victims’ sensitive data, which it exfiltrates from browsers, messaging apps, and other software. The malware is equipped with advanced features, including fingerprinting, control panel, evasion mechanisms, string obfuscation, etc. Stealc establishes persistence and communicates with its C2 server through HTTP POST requests.

StealC is an infostealer variant focused on theft of confidential information including browser-stored data, cookies, cryptocurrency wallets or data from various messaging applications. In a recent campaign StealC binaries have been disguised as installer/setup files for various well known applications or cracked software installations. The fake installers are distributed via publicly accessible file repositories such as GitHub, Mega or Dropbox, among others.

Symantec protects you from this threat, identified by the following:

Behavior-based

  • SONAR.Stealer!gen2

File-based

  • Trojan.Gen.MBT
  • WS.Malware.1

Machine Learning-based

  • Heur.AdvML.A!300
  • Heur.AdvML.B
  • Heur.AdvML.C

Web-based

  • Observed domains/IPs are covered under security categories in all WebPulse enabled product S

What is Stealc?

Stealc is the name of an information-stealing malware. It targets a wide variety of data associated with browsers, messaging software, cryptocurrency wallets, and other apps/extensions.

According to Stealc's developers, it was created by relying on VidarRaccoonMars, and RedLine stealers. Naturally, this malicious program shares similarities with the aforementioned malware. At the time of writing, Stealc is in active development – with the developers releasing new variants on a nearly weekly Basoc

Chromium, Google Chrome, Chrome Canary, Mozilla Firefox, Amigo, Torch, Vivaldi, Comodo, EpicPrivacyBrowser, CocCoc, Brave, Cent, 7Star, Chedot, Microsoft Edge, 360, QQBrowser, CryptoTab, Opera, Opera GX, Opera Crypto, and Pale Moon.

List of targeted browser extensions/plug-ins:

MetaMask, TronLink, Opera Wallet, Binance, Yoroi, Coinbase, Guarda, Jaxx, iWallet, MEW CX, GuildWallet, Ronin Wallet, NeoLine, CLV, Liquality, Terra Station, Keplr, Sollet, Auro Wallet, Polymesh, ICONex, Coin98, EVER, KardiaChain, Rabby, Phantom, Brave, Oxygen, Pali, BOLT X, XDEFI, Nami, Maiar DeFi Wallet, Keeper, Solflare, Cyano, KHC, TezBox, Temple, Goby, Ronin, Byone, OneKey , DAppPlay, SteemKeychain, Braavos, Enkrypt, OKX, Sender, Hashpack, Eternl, Pontem Aptos, Petra Aptos, Martian Aptos, Finnie, Leap Terra, Trezor Password Manager, Authenticator, Authy, EOS Authenticator, GAuth Authenticator, Bitwarden, KeePassXC, Dashlane, NordPass, Keeper, RoboForm, LastPass, BrowserPass, MYKI, Splikity, CommonKey, and Zoho Vault.

List of targeted desktop cryptocurrency wallets:

Bitcoin Core, Dogecoin, Raven, Daedalus, Blockstream Green, Wasabi, Ethereum, Electrum, Electrum-LTC, Exodus, Electron Cash, MultiDoge, Jaxx Desktop, Atomic, Binance, and Coinomi.

List of targeted email clients:

  • Microsoft Outlook
  • Thunderbird

List of targeted messengers:

  • Telegram
  • Discord
  • Tox
  • Post in





Comments

Popular posts from this blog

July 2024 Patch Tuesday Unleashes a Torrent of Updates

CVE-2023-26369 Adobe acrobat update

US court holds Israeli spyware liable for hacking Meta’s WhatsApp