SharePoint RCE Exploited via XML Payload
July 18, 2025Rhadamanthys Stealer – Active IOCs
July 18, 2025SharePoint RCE Exploited via XML Payload
July 18, 2025Rhadamanthys Stealer – Active IOCs
July 18, 2025Severity
High
Analysis Summary
Stealc is a new malware that was first marketed by an actor named Plymouth on the XSS and BHF Russian-speaking underground forums on January 9, 2023. The malware is written in C and can steal data from web browsers, crypto wallets, email clients, and messaging apps. It is also equipped with a customizable file grabber that allows buyers to tailor the module to siphon files of interest. Stealc implements loader capabilities to deploy additional payloads.
According to researchers, Stealc quickly established itself as a reliable threat actor, and its malware gained the trust of cybercriminals dealing with information stealers. The malware is being distributed through various vectors, including YouTube videos posted from compromised accounts that link to a website peddling cracked software.
- Stealc stealer on XSS
"Since customers of the Stealc MaaS own a build of its administration panel to host the stealer C2 server and generate stealer samples themselves, it is likely that the build will leak into the underground communities in the medium term,"
SEKOIA predicts that the Stealc malware administration panel, which customers of the malware-as-a-service own, will likely leak into underground communities in the medium term. Antivirus vendor Avast lists Stealc as a new addition to the list of most prevalent stealer malware strains, which includes FormBook, Agent Tesla, RedLine, LokiBot, Raccoon, Snake Keylogger, and Arkei (along with its fork Vidar), during Q4 2022.
The discovery of Stealc highlights the ongoing threat posed by information-stealing malware and the importance of remaining vigilant against cyber threats. Individuals and organizations should take proactive steps like using strong passwords and two-factor authentication, regularly updating software and security tools, and being cautious when opening emails or downloading files from unknown sources. It is also important to use antivirus software and other security tools to detect and prevent malware infections.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
80f46191393d1d5b845e7fe89b12c91b
b283341717552ade30c3b669804b2444
dff8ae1f25626d71e1d45e13f82379fe
3497c36b77a5f0a7864a96d00ebe3eeb
SHA-256
543620f6d04f62b16bd60007c12ef7b7e2985e97fc16c6f4eaef3d5aac2a2a6d
ebf0439dd3843b4dca50a83fd275b41d9ee0bcb68d2fbadb55449ca380c2e892
37e4dc8f4893d589f41db84676ade7b1c90113cfce5e4dfcad350389ce67e61b
ffe0b7c5fc5263eef30a54f81d9344a0e89046b6a4541fe500dc067deb74a1a2
SHA-1
7ba37121a0ed1c973d967adc68c6362160483253
d0657962acbb382ae8c4e8a116aff0e674cf1078
256781104374e8661578cddd906514b6f0e98170
784ffde04e169f296a65f14585f81578678540b8
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Check for any unauthorized transactions or activities on your financial accounts and report any suspicious activities to the respective authorities.
- Ensure that your operating system and all applications are up to date with the latest security patches and updates to prevent vulnerabilities that can be exploited by malware.
- Implement two-factor authentication for your online accounts to provide an additional layer of security.
- Avoid downloading and installing pirated software, as these sites are often a source of malware infections.
- Educate yourself and your employees on safe computing practices, such as being cautious when opening emails and downloading attachments, to prevent future infections.