{"id":13453,"date":"2023-02-22T09:22:49","date_gmt":"2023-02-22T09:22:49","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=13453"},"modified":"2023-02-22T09:22:49","modified_gmt":"2023-02-22T09:22:49","slug":"new-infostealer-stealc","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/new-infostealer-stealc\/","title":{"rendered":"Cybersecurity Experts Discovered a New Stealc Infostealer"},"content":{"rendered":"<p><h4>ekoia experts report that a new infostealer, Stealc, has appeared on the darknet, and is gaining popularity among criminals due to aggressive advertising and similarities to malware such as Vidar, Raccoon, Mars, and Redline.<\/h4>\n<\/p>\n<p>Let me remind you that we also wrote that <a href=\"\/blogs\/stop-djvu-ransomware-discord-redline\/\"><strong>Djvu<\/strong> Ransomware Spreads via <strong>Discord<\/strong>, Carrying <strong>RedLine<\/strong> Stealer<\/a>, and also that <a href=\"\/blogs\/netsupport-and-raccoonstealer\/\"><strong>NetSupport<\/strong> and <strong>Raccoon<\/strong> Stealer malware spreads masked as <strong>Cloudflare<\/strong> warnings<\/a>.<\/p>\n<p>Also information security specialists reported that <a target=\"_blank\" href=\"https:\/\/howtofix.guide\/raccoon-malware-steals-data-from-60-different-applications\/\" rel=\"noopener nofollow\">Raccoon malware steals data from 60 different applications<\/a>.<\/p>\n<p>For the first time, analysts noticed the advertisement of the new malware back in January, and <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/blog.sekoia.io\/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1\/\">in February it began to actively gain popularity<\/a>.<\/p>\n<p>On hack forums and <strong>Telegram<\/strong> channels, <strong>Stealc<\/strong> is advertised by someone under the nickname <strong>Plymouth<\/strong>. He says that the malware is a &#8220;non-resident stealer with flexible settings and a convenient admin panel.&#8221;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/Advertisement-Stealc.jpg\" alt=\"new infostealer Stealc\" title=\"\"><br \/>\nAdvertisement Stealc<\/p>\n<p>In addition to the usual targeting of data from browsers, extensions and cryptocurrency wallets for such malware (the malware targets 22 browsers, 75 plugins and 25 desktop wallets), Stealc can also be configured to capture certain types of files that the malware operator wants to steal.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/Malware-development.jpg\" alt=\"new infostealer Stealc\" title=\"\"><br \/>\nConfiguration Instructions for Browser Attacks<\/p>\n<p>The advertisement notes that when developing Stealc, its authors relied on solutions already existing &#8220;on the market&#8221;, including <strong>Vidar<\/strong>, Raccoon, <strong>Mars<\/strong> and Redline.<\/p>\n<p><strong>Sekoia<\/strong> analysts noticed that Stealc, Vidar, Raccoon, and Mars have in common that they all load legitimate third-party DLLs (eg sqlite3.dll, nss3.dll) to steal sensitive data. The researchers also say that the organization of communication with the control server of one of the samples of the new stealer they analyzed is similar to Vidar and Raccoon.<\/p>\n<p>In total, the researchers identified more than 40 Stealc <strong>C&#038;C<\/strong> servers and several dozen malware samples. According to them, this indicates that the new malware has aroused considerable interest among the cybercriminal community.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/Configuration-Instructions-for-Browser-Attacks.jpg\" alt=\"new infostealer Stealc\" title=\"\"><br \/>\nMalware development<\/p>\n<p>One of Stealc&#8217;s distribution methods that researchers have already discovered is YouTube videos that describe how to install the cracked software and contain links to download sites. In such programs, a stealer is built in, which starts working and communicates with the control server after the installer is launched.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/Site-distributing-stealer.jpg\" alt=\"new infostealer Stealc\" title=\"\"><br \/>\nSite distributing stealer<\/p>\n<p>According to experts, hacker clients with access to the Stealc administration panel can generate new stealer samples, and this increases the chances of the malware leaking and making it available to a wider audience in the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ekoia experts report that a new infostealer, Stealc, has appeared on the darknet, and is gaining popularity among criminals due to aggressive advertising and similarities to malware such as Vidar, Raccoon, Mars, and Redline. Let me remind you that we also wrote that Djvu Ransomware Spreads via Discord, Carrying RedLine Stealer, and also that NetSupport [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":13461,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[416,1137,879,1182],"class_list":{"0":"post-13453","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-darknet","9":"tag-raccoon","10":"tag-sekoia","11":"tag-vidar"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/new-infostealer-Stealc.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=13453"}],"version-history":[{"count":3,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13453\/revisions"}],"predecessor-version":[{"id":13460,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13453\/revisions\/13460"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/13461"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=13453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=13453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=13453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}