
Severity
High
Analysis Summary
Stealc is a new malware that was first marketed by an actor named Plymouth on the XSS and BHF Russian-speaking underground forums on January 9, 2023. The malware is written in C and can steal data from web browsers, crypto wallets, email clients, and messaging apps. It is also equipped with a customizable file grabber that allows buyers to tailor the module to siphon files of interest. Stealc implements loader capabilities to deploy additional payloads.
According to researchers, Stealc quickly established itself as a reliable threat actor, and its malware gained the trust of cybercriminals dealing with information stealers. The malware is being distributed through various vectors, including YouTube videos posted from compromised accounts that link to a website peddling cracked software.
- Stealc stealer on XSS
"Since customers of the Stealc MaaS own a build of its administration panel to host the stealer C2 server and generate stealer samples themselves, it is likely that the build will leak into the underground communities in the medium term,"
SEKOIA predicts that the Stealc malware administration panel, which customers of the malware-as-a-service own, will likely leak into underground communities in the medium term. Antivirus vendor Avast lists Stealc as a new addition to the list of most prevalent stealer malware strains, which includes FormBook, Agent Tesla, RedLine, LokiBot, Raccoon, Snake Keylogger, and Arkei (along with its fork Vidar), during Q4 2022.
The discovery of Stealc highlights the ongoing threat posed by information-stealing malware and the importance of remaining vigilant against cyber threats. Individuals and organizations should take proactive steps like using strong passwords and two-factor authentication, regularly updating software and security tools, and being cautious when opening emails or downloading files from unknown sources. It is also important to use antivirus software and other security tools to detect and prevent malware infections.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
4dcc556f843a576529c081a6e1c878e2
e335078f6ee775e39fd9955c1c93bd14
9bbce4f97ec6ce722de9ad3619b7c4e9
a13012f26216459efd22cbd93dfbb382
470aa1549c4266690a1a8d6d921017f9
SHA-256
90208d9829610c65880196d3e28539b95394639d9b2c6a86c57d6f54d8962e60
7914fb76e64e6766ca024f023a2ea009ddce2c41d35582bdd68e1a4197cdda48
b0ba827719a2481183cec325d9daca05c0c0f88f7dba1a9f5a0d5a8efa0259aa
1623650a9c842eb4d7172218d746a51bd04e9d9c47eef1ee70129dd010584c00
b7c3785aa2b9f10fc77bf33df04b2845d06d0ccfefd9df2af598f7ac0cf99f17
SHA-1
81844169aee4b15c2ead4b70891ee4a7daf65cf6
fdaa16e36eeed2c608a356ba19e5c0804547755f
61672133522cab050ec53e3e7df875d4cf7634cc
36fb42c5148aacc3916106c8edb57a9621edff72
57359f54841f8d0a4ae15fa53e9eb3dca725fa36
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Check for any unauthorized transactions or activities on your financial accounts and report any suspicious activities to the respective authorities.
- Ensure that your operating system and all applications are up to date with the latest security patches and updates to prevent vulnerabilities that can be exploited by malware.
- Implement two-factor authentication for your online accounts to provide an additional layer of security.
- Avoid downloading and installing pirated software, as these sites are often a source of malware infections.
- Educate yourself and your employees on safe computing practices, such as being cautious when opening emails and downloading attachments, to prevent future infections.