StealC
StealC is an information stealer sold as a malware-as-a-service by a developer known as Plymouth on Russian-speaking underground forums since January 2023. Subscriptions run $200 per month, and the developer openly stated that StealC's design borrows from Vidar, Raccoon, Mars, and RedLine. The V1 source code was later offered at $3,000 per copy, which expanded the operator base beyond direct subscribers.
The stealer targets credentials and session data from over 20 browsers, 50+ cryptocurrency wallet extensions, email clients including Outlook, messaging apps like Telegram and Discord, and Steam authentication tokens. A file grabber sweeps user directories for documents, database files, and wallet data. Version 2, released in March 2025, changed how browser credentials are handled. Chromium passwords and cookies are no longer decrypted on the victim's machine. Instead, the encrypted login data and master key get exfiltrated to the C2 server for server-side decryption. This sidesteps Chrome's application-bound encryption and shrinks the malware's local detection footprint.
C2 communication uses a JSON-based HTTP protocol on port 80. The bot registers with a build ID and hardware fingerprint, receives an access token and collection config, then uploads stolen data as Base64-encoded payloads with chunking for large files. String obfuscation uses two-stage RC4 with hardcoded keys, and network traffic gained RC4 encryption in later V2 builds. C2 URLs follow a consistent pattern of random hexadecimal PHP endpoints. The malware refuses to run on systems with CIS country language settings and can self-delete on command from the server.
Distribution runs through third-party delivery services rather than by StealC operators directly. The biggest vector is ClickFix, a social engineering technique where compromised websites show fake CAPTCHA pages that trick users into pasting PowerShell commands. Other chains include the Amadey botnet loader, MintsLoader via phishing attachments, and AI-generated TikTok and YouTube videos posing as software activation tutorials. One TikTok video telling users to run a PowerShell command hit roughly 500,000 views. A separate campaign built a fake meeting app called Vortax, pushed through crypto-focused Discord and Telegram channels, and stole over $245,000 in cryptocurrency. Stolen StealC credentials have also fed into ransomware operations, with initial access brokers reselling harvested VPN credentials.
Infrastructure sits on raw IP addresses hosted by bulletproof providers across the Netherlands, Finland, Germany, and Russia. Domain-based C2 servers use cheap disposable TLDs like .top, .icu, and .sbs. At its V1 peak in August 2023, over 120 C2 servers were active at once. The V2 admin panel source code leaked publicly in late 2025. Researchers then found an XSS vulnerability in the panel that let them steal operator session cookies - a fitting weakness in a tool built to steal cookies.
C2 Infrastructure
Last 7 days
| Date | C2 Hosts |
|---|---|
| Apr 14, 2026 | 7 |
| Apr 13, 2026 | 4 |
| Apr 12, 2026 | 3 |
| Apr 11, 2026 | 7 |
| Apr 10, 2026 | 5 |
| Apr 9, 2026 | 21 |
| Apr 8, 2026 | 9 |
Further Reading
Sekoia's original analysis from February 2023. Documents code lineage from Vidar, Raccoon, Mars, and RedLine. Covers V1 C2 protocol, DLL dependencies, and data collection sequence.
Zscaler's tracking of V1 configuration evolution across three major shifts in 2023. Documents C2 infrastructure scale peaking at 120+ simultaneous servers in August 2023.
CyberArk's V2 protocol deep-dive and admin panel XSS discovery. Covers RC4 string obfuscation, JSON C2 communication, server-side credential decryption, and the irony of a cookie stealer lacking httpOnly protections.
Trend Micro documents AI-generated TikTok videos tricking users into running PowerShell commands disguised as software activation guides. One video reached 500,000 views.
Recorded Future's investigation of the Vortax fake meeting software campaign. Cross-platform delivery (Windows + macOS), crypto-focused targeting via Discord and Telegram, over $245,000 in cryptocurrency stolen.
Trend Micro's analysis of EncryptHub exploiting CVE-2025-26633 to deploy StealC alongside other stealers. Covers malicious provisioning packages, signed MSI files, and shared C2 infrastructure.
Sophos traces a full kill chain from ClickFix social engineering through StealC credential theft to VPN access sold by an initial access broker, ending in Qilin ransomware deployment.
Recorded Future's analysis of MintsLoader as a multi-stage delivery mechanism for StealC. Covers phishing with JavaScript invoice attachments and fake CAPTCHA landing pages.
VMRay's early technical analysis of V1. Covers anti-VM checks, dynamic API resolution, third-party DLL downloads from C2, and the data collection workflow.