Mirai Botnet aka Katana – Active IOCs
September 22, 2025Multiple Microsoft Windows Products Vulnerabilities
September 22, 2025Mirai Botnet aka Katana – Active IOCs
September 22, 2025Multiple Microsoft Windows Products Vulnerabilities
September 22, 2025Severity
High
Analysis Summary
Stealc is a new malware that was first marketed by an actor named Plymouth on the XSS and BHF Russian-speaking underground forums on January 9, 2023. The malware is written in C and can steal data from web browsers, crypto wallets, email clients, and messaging apps. It is also equipped with a customizable file grabber that allows buyers to tailor the module to siphon files of interest. Stealc implements loader capabilities to deploy additional payloads.
According to researchers, Stealc quickly established itself as a reliable threat actor, and its malware gained the trust of cybercriminals dealing with information stealers. The malware is being distributed through various vectors, including YouTube videos posted from compromised accounts that link to a website peddling cracked software.
- Stealc stealer on XSS
"Since customers of the Stealc MaaS own a build of its administration panel to host the stealer C2 server and generate stealer samples themselves, it is likely that the build will leak into the underground communities in the medium term,"
SEKOIA predicts that the Stealc malware administration panel, which customers of the malware-as-a-service own, will likely leak into underground communities in the medium term. Antivirus vendor Avast lists Stealc as a new addition to the list of most prevalent stealer malware strains, which includes FormBook, Agent Tesla, RedLine, LokiBot, Raccoon, Snake Keylogger, and Arkei (along with its fork Vidar), during Q4 2022.
The discovery of Stealc highlights the ongoing threat posed by information-stealing malware and the importance of remaining vigilant against cyber threats. Individuals and organizations should take proactive steps like using strong passwords and two-factor authentication, regularly updating software and security tools, and being cautious when opening emails or downloading files from unknown sources. It is also important to use antivirus software and other security tools to detect and prevent malware infections.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
2b366e711484cb6648e02bc9d7774f3f
0c6b725f88830a6c5361b86f991de010
27ef3cd830f44d5a20e914d6ab7ed5bc
e61406f9ba02fd810a07856095ee5619
SHA-256
59f80ca5386ed29eda3efb01a92fa31fb7b73168e84456ac06f88fdb4cd82e9e
d1911dff6da25f6c988bc566667bb42f455c2d681eace32e353331996c3510b7
103dae28c1b7812375c285163ede0b117a949988bf46e0b26a65ef37b866e215
9acfadc7319deb2b973ea96dcc96600a02e11923699d3d5ad0dabebec3a661dc
SHA-1
23ac7f0f4e76e81081e92574b9a890d15c081d37
5fc893ee4171d357b19b8456bb3bb7bedf0c2737
f8610ab53ea108edc091cd17efff908319b2d1da
a7dcd144dea21342aa013adf5f049b260388f937
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Check for any unauthorized transactions or activities on your financial accounts and report any suspicious activities to the respective authorities.
- Ensure that your operating system and all applications are up to date with the latest security patches and updates to prevent vulnerabilities that can be exploited by malware.
- Implement two-factor authentication for your online accounts to provide an additional layer of security.
- Avoid downloading and installing pirated software, as these sites are often a source of malware infections.
- Educate yourself and your employees on safe computing practices, such as being cautious when opening emails and downloading attachments, to prevent future infections.