Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Stealc

18
Global rank
6 infographic chevron month
Month rank
7 infographic chevron week
Week rank
0
IOCs

Stealc is a stealer malware that targets victims’ sensitive data, which it exfiltrates from browsers, messaging apps, and other software. The malware is equipped with advanced features, including fingerprinting, control panel, evasion mechanisms, string obfuscation, etc. Stealc establishes persistence and communicates with its C2 server through HTTP POST requests.

Stealer
Type
ex-USSR
Origin
1 January, 2023
First seen
7 February, 2026
Last seen

How to analyze Stealc with ANY.RUN

Type
ex-USSR
Origin
1 January, 2023
First seen
7 February, 2026
Last seen

IOCs

IP addresses
193.106.174.125
194.50.153.69
77.246.99.24
167.235.140.81
85.192.40.37
172.86.66.22
172.86.77.177
45.141.86.121
172.86.66.42
5.161.97.13
5.161.66.54
193.233.49.95
91.201.113.144
89.23.98.198
194.50.153.109
77.105.147.59
89.116.255.177
162.33.178.221
94.142.138.121
104.234.10.108
Hashes
4630f2e42c67690b34c187feee43eabe447c935dea079b5bf1c480de070d097c
aa3df8b8bf546c07264c7f5f91790b25e83359317483e2f0f42aa11cb4ab29f7
e8d1c4f4cea682bee4ba4105f14bab0f6bcec51727080e1bc76993fa82f214fa
5dda23dea89feea09086361d99a9dc1c04f1a2e552a2f5f52cb83d2d8e4e11f8
9c9306c968318a95791dee86bbc6c16f6b1d0f53b5b7d682c2a48a5c6cc1a75e
aebd5e547d9d38dfcf2030986605a800de9f0cdcf27e0d3906b9a00812159870
8c10f794a46fb4dcb0a0a2b4ef9c8980f332e9487dd3200cfb3da2e0d2c2df38
a85528d4fcbc101d6c0fc37aad3e1859ad6e8a2556883900627f5e5f455f4f0d
2fc2dbfc4d287d1cc2fd6021c2b8285f96b8ae83710a7f6cd301ff53418422f4
6a37fb22ba4cf331c954a84f31a730bce22d16a8b86833488c0724f50a338fe7
d6bc2b0f5899b66f3e21c6f8616c02aa218b6fbf292e9131da0414badacfe62e
fafe7d66e5bd7b863c859d329c390978d7e2db8627664e1427f7f184ba7dc24e
9bc696c7c68c2c31cd431ed0af9264fe056942923399b1adb4c55241639bc835
908548cb94a13710b0668aca7ef2045da8ba4443e9edcae7a46e93900856d1a3
a5f2f3c199df73e31969d96acc46694759792ba294c6311d37bb7b72f5e54fde
8a203721f1f1ca0d1026969363b9182a42aade9766d0cb2e296965182b76628d
2249197c31828fc399259ec0264df1eec433a0294253b121616c265b9bcb198b
2645970960a371b535d69137952599f3577b193594e1266b8e6f6d8c9521f024
24169a2e792caa88dea3ded0931e30d920a6bb374920f0ad89ab4eb598ac3565
98ab57ac192335e03016f40e6d1fd05f267fec8c15840ae64ca0ebee2bd10807
Domains
facebook.meta-software-worldwide.com
lazaniaabstract.com
erberloose.club
elprogresofood.com
dropcheats.pw
solidolbabrering.shop
lionsmanetech.shop
ultra4ktool.com
content-v2-verisoiu.icu
fttyyu-could.icu
universalmarinemedical.com
orederpush.cfd
web-telegram.us
unnnaaxxx.xyz
lp.asiatravel.co.il
67ef004eb58d960eb348ede9041aef0c.fit
islonline.org
hosting2.ro.hostsailor.com
joyeriatauro.com
geelyg7shopxz.com
URLs
http://193.233.134.93/fd07ec3137071f71.php
http://ronaldlitt.top/25d4fc7fb0cb6b78.php
http://91.107.224.54/6e26382b1807d1b9.php
http://5.78.104.48/d130c39575999622.php
http://77.105.146.130/5196ba262b6d60e7.php
http://e.42.199.15/14387668e1174a87.php
http://45.87.154.30/09c9de54c6be1727.php
http://jeffmorales.top/410b5129171f10ea.php
http://185.99.133.229/4107e896e74f964e.php
http://publisherget.top/410b5129171f10ea.php
http://80.85.241.225/ef05b005854e73ec.php
http://109.206.243.134/d88e594c8a5bc165.php
http://weighget.top/410b5129171f10ea.php
http://77.105.147.59/11b02a89f31386ea.php
http://45.15.157.6/9827126d94c3e848.php
http://80.94.95.137/3cd43889ddd6a80f.php
http://194.87.31.227/749040188a8229aa.php
http://79.137.206.248/0cf6bfa19d78b1fb.php
http://116.203.178.118/ea31e67ac48ef2ad.php
http://85.239.54.29/2c843dccbeb16860.php
Last Seen at

Recent blog posts

post image
How Threat Intelligence Helps Protect Financi...
watchers 404
comments 0
post image
Release Notes: Workflow Improvements, MISP In...
watchers 2202
comments 0
post image
Enterprise Phishing: How Attackers Abuse Trus...
watchers 4287
comments 0

What is malware: Stealc?

Stealc is an infostealer written in C that has been promoted and sold on DarkWeb forums since the beginning of 2023. This malware is primarily used to steal sensitive data from programs, such as web browsers, email clients and messengers. Some examples of such software include Discord, Telegram, and Outlook. This malicious software also has the capability to grab files from infected systems and drop additional malware on them.

According to an interview conducted by threat researcher g0njxa with the developers of the malware, the unique feature of Stealc is the provision of a PHP control panel that has to be hosted on the operator's own server, which gives them more privacy.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Stealc malicious software technical details

Stealc has a range of functions that make it a serious threat. Here are some of its notable features:

  • Fingerprinting: Stealc collects different info about the infected system, including public IP address, geolocation, hardware ID, OS version, etc.
  • Control Panel: Attackers are provided with a control panel for managing attacks and configuring the malware. The panel allows attackers to manipulate stolen data and make changes to their campaigns.
  • Evasion Mechanisms: Stealc checks for virtual or sandbox environments to evade detection. It also uses unconditional jumps to make the decompilation process more time-consuming and error-prone. Additionally, Stealc checks for the presence of antivirus software and terminates itself if it detects any.
  • String obfuscation: The malware relies on RC4 encryption and base64 encoding to protect its strings.
  • Dropping Other Malware: Stealc can also upload additional malicious software on to the victim’s machine, such as Laplas Clipper, which intercepts clipboard data and replaces cryptocurrency wallet addresses with the attacker's own address.

Stealc requires external DLLs that are not embedded in the PE but rather downloaded from a specific URL hosted by the C2. The downloaded DLLs include sqlite3.dll, freebl3.dll, mozglue.dll, etc. These DLLs provide additional functionality to the malware, such as interacting with SQLite databases, encrypting data, and interacting with Mozilla-based applications.

After establishing persistence, Stealc begins its communication with the C2 server, first requesting its configuration and then exfiltrating stolen data with the help of HTTP POST requests.

In summary, Stealc is a sophisticated malware that can steal sensitive data, evade detection, establish persistence, and communicate with a C2 server. Its unique features and capabilities make it a significant threat to cybersecurity. It is crucial for individuals and organizations to take proactive measures to protect themselves from such threats.

Stealc execution process

To analyze Stealc, we can upload its sample to the ANY.RUN sandbox for detailed analysis.

Stealc malware typically operates through a multi-stage execution chain to compromise systems and steal sensitive information. Initially, it may infiltrate a target system through various means such as phishing emails, malicious downloads, or exploiting software vulnerabilities. Once inside, it may establish persistence mechanisms to ensure its continued operation even after system reboots. Stealc then proceeds to escalate its privileges to gain deeper access to the system and evade detection.

It often employs techniques like code injection or hooking to hide its presence from security software. Finally, the malware executes its primary function of stealing data, such as login credentials, financial information, or personal documents, and exfiltrates it to remote servers controlled by the attackers. Throughout this process, Stealc may employ encryption and obfuscation techniques to further mask its activities and evade detection by security measures.

Stealc process tree shown in ANY.RUN Stealc process tree demonstrated in ANY.RUN

In the example, the malware checks the operating system language and creates a scheduled task through the Windows Task Scheduler to repeatedly execute malicious code. However, the execution chain of Stealc often consists of a single process that performs all malicious activities.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Stealc malware distribution methods

Attackers employ various methods to distribute Stealc malware. One of the most common methods is the use of fake websites offering legitimate software for download. Users are tricked into downloading Stealc instead of the program they were looking for.

Another distribution method is through malicious email attachments. Attackers send phishing emails with malicious attachments, such as Microsoft Office documents or PDF files, that contain the Stealc payload.

Stealc can also be dropped by loaders, malicious programs that are designed to download and install other malware onto a compromised system. One example is CrackedCantil, which is a loader that has been observed dropping Stealc, as well as other ones, such as Lumma, RisePro, and RedLine.

Conclusion

Stealc is an advanced malware that can steal sensitive data, evade detection, and maintain persistence on compromised devices. To safeguard against such threats, individuals and organizations need to take proactive measures. ANY.RUN is an online sandbox that provides an effective solution for this purpose.

ANY.RUN's sandbox provides a secure and isolated environment for running and analyzing malware samples. This allows users to observe the behavior of the malware without putting their systems at risk. The detailed technical reports generated by ANY.RUN provide insights into the malware's functionality, communication patterns, and other important characteristics.

Create your ANY.RUN account – it’s free!

HAVE A LOOK AT

Qilin Ransomware screenshot
Qilin ransomware (predecessor known as “Agenda”) is a rapidly evolving ransomware-as-a-service (RaaS) operation targeting organizations worldwide. Known for double extortion tactics (encrypting files while also threatening to leak stolen data) Qilin has quickly gained notoriety for its customization, flexibility, and impact on critical infrastructure.
Read More
Ransomware screenshot
Ransomware
ransomware
Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.
Read More
Spynote screenshot
Spynote
spynote
SpyNote, also known as SpyMax and CypherRat, is a powerful Android malware family designed primarily for surveillance and data theft, often categorized as a Remote Access Trojan (RAT). Originally emerged in 2016, SpyNote has evolved significantly, with new variants continuing to appear as recently as 2023–2025.
Read More
Botnet screenshot
Botnet
botnet
A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.
Read More
Sliver screenshot
Sliver
sliver
Sliver is an open-source command-and-control (C2) framework that has been increasingly adopted by threat actors as an alternative to tools like Cobalt Strike. Developed by security firm Bishop Fox, Sliver was initially intended for legitimate security testing and red teaming exercises. However, its robust features and open-source nature have made it attractive to malicious actors seeking to control compromised systems.
Read More
DarkGate screenshot
DarkGate
darkgate
DarkGate is a loader, which possesses extensive functionality, ranging from keylogging to crypto mining. Written in Delphi, this malware is known for the use of AutoIT scripts in its infection process. Thanks to this malicious software’s versatile architecture, it is widely used by established threat actors.
Read More