{"id":13137,"date":"2025-04-29T12:06:46","date_gmt":"2025-04-29T12:06:46","guid":{"rendered":"\/cybersecurity-blog\/?p=13137"},"modified":"2025-07-17T08:22:10","modified_gmt":"2025-07-17T08:22:10","slug":"pentagon-stealer-malware-analysis","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/","title":{"rendered":"Pentagon Stealer: Go and Python Malware with Crypto Theft Capabilities\u00a0"},"content":{"rendered":"\n<p>The current article provides technical analysis of an emerging malware named Pentagon Stealer. The research has been prepared by the analyst team at <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Takeaways&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Variants<\/strong>: Exists in <a href=\"https:\/\/any.run\/cybersecurity-blog\/pre-installed-dev-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">Python<\/a> (AES-encrypted, multi-stage) and Golang (unencrypted, part of attack chains) versions.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Theft<\/strong>: Steals browser credentials, cookies, <a href=\"https:\/\/any.run\/cybersecurity-blog\/crypto-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">crypto<\/a> wallet data (Atomic\/Exodus), Discord\/Telegram tokens, and specific files.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Debug Mode Exploitation<\/strong>: Launches Chromium-based browsers in debug mode to extract unencrypted cookies, bypassing DPAPI <a href=\"https:\/\/any.run\/cybersecurity-blog\/encryption-algorithms-in-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">encryption<\/a> for easier data theft.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Crypto Wallet Injection<\/strong>: Replaces app.asar files in Atomic\/Exodus wallets with patched versions to steal mnemonics\/passwords, using a public proof-of-concept available on GitHub.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Evolution and Campaigns<\/strong>: Spread via typosquatting, later under the names 1312, Acab, Vilsa, and BLX stealer. BLX adds clipboard, screenshot, and Steam\/Epic data theft.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>C2 Communication<\/strong>: Uses HTTP requests with servers like pentagon[.]cy and <em>stealer[.]cy<\/em>; BLX uploads to gofile.io, sending links to C2.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ongoing Threat<\/strong>: Simple but persistent, with new variants showing minor updates, continuing to pose risks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How We Discovered Pentagon Stealer&nbsp;<\/h2>\n\n\n\n<p>In early March of this year, when browsing <a href=\"https:\/\/app.any.run\/submissions\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Public submissions<\/a>, the ANY.RUN team came across an interesting malware sample written in Golang.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/ee0a809d-1d42-4074-aa15-83a5ae6be6cb\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View sandbox analysis of the sample<\/a>&nbsp;<\/p>\n\n\n\n<p>The malicious program exhibited unusual behavior, first terminating and then restarting processes of popular web browsers (Image 1).&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"727\" height=\"641\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1c.png\" alt=\"\" class=\"wp-image-13156\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1c.png 727w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1c-300x265.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1c-370x326.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1c-270x238.png 270w\" sizes=\"(max-width: 727px) 100vw, 727px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 1<\/em><\/strong><em>. ANY.RUN Sandbox showing the sample\u2019s browser activities<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The malware also engaged in data theft, which was flagged by ANY.RUN&#8217;s Interactive Sandbox.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1894\" height=\"780\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/2-1024x422.png\" alt=\"\" class=\"wp-image-13158\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/2-1024x422.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/2-300x124.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/2-768x316.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/2-1536x633.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/2-370x152.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/2-270x111.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/2-740x305.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/2.png 1894w\" sizes=\"(max-width: 1894px) 100vw, 1894px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 2<\/em><\/strong><em>. The sandbox flagged Pentagon\u2019s data theft attempts<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>To collect more context about this malware, we used <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> (Image 3)\u00a0with queries like the following one:\u00a0<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktolookup#%7B%2522query%2522:%2522domainName:%255C%2522pentagon.cy%255C%2522%2520OR%2520domainName:%255C%2522stealer.cy%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">domainName:&#8221;pentagon.cy&#8221; OR domainName:&#8221;stealer.cy&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"563\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1f-1-1024x563.png\" alt=\"\" class=\"wp-image-13160\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1f-1-1024x563.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1f-1-300x165.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1f-1-768x422.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1f-1-1536x845.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1f-1-370x204.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1f-1-270x149.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1f-1-740x407.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image1f-1.png 1840w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 3<\/em><\/strong><em>. Sandbox analyses with the Pentagon tag displayed in TI Lookup<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Among the search results, we identified a <a href=\"https:\/\/app.any.run\/tasks\/804f96d2-5ed6-4a44-babd-0a7ada9ed80d\" target=\"_blank\" rel=\"noreferrer noopener\">sandbox analysis<\/a> of a website hosted on the domain <em>pentagon.cy<\/em> that featured the admin panel of this malware. Thus, we named it Pentagon Stealer.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"757\" height=\"788\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image20.png\" alt=\"\" class=\"wp-image-13162\" style=\"width:520px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image20.png 757w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image20-288x300.png 288w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image20-370x385.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image20-270x281.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image20-740x770.png 740w\" sizes=\"(max-width: 757px) 100vw, 757px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 4<\/em><\/strong><em>. The admin panel<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Exploring the website further, we discovered that there was also a Python-based version of this malicious program, available at <em>pentagon[.]cy\/paste?userid=&lt;n&gt;<\/em>. You can see the page in <a href=\"https:\/\/app.any.run\/tasks\/303dab54-a2d4-4de9-82a1-6d98fe590914\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">this sandbox session<\/a>.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1001\" height=\"330\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image21-1.png\" alt=\"\" class=\"wp-image-13164\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image21-1.png 1001w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image21-1-300x99.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image21-1-768x253.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image21-1-370x122.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image21-1-270x89.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image21-1-740x244.png 740w\" sizes=\"(max-width: 1001px) 100vw, 1001px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 5. The original page<\/em><\/strong><em> containing a dropper script for deploying the first stage of the malware<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Considering the lack of public information on the malware and its potential to pose serious threat to our clients, we decided to analyze it and collect essential intel for effective detection of Pentagon Stealer.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s what we\u2019ve found.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nFollow along the analysis with <span class=\"highlight\">ANY.RUN&#8217;s Interactive Sandbox<\/span> and launch your own malware investigations&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=pentagon_stealer&#038;utm_term=290425&#038;utm_content=linktoregistration#register\/\" target=\"_blank\" rel=\"noopener\">\nSign up with business email\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Python Version of Pentagon Stealer&nbsp;<\/h2>\n\n\n\n<p>Let\u2019s start with the Python variant which still can be found on the attackers\u2019 infrastructure to this day. Next, we\u2019ll compare its functionality to that of the previous versions.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Initial Stage: Script Dropper&nbsp;<\/h3>\n\n\n\n<p>As seen in the <a href=\"https:\/\/app.any.run\/tasks\/3ee45ba5-af74-42e8-9a04-019bcbf0c349\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">sandbox analysis<\/a>, the attack begins with a script dropper. Its purpose is to launch python_setup.py encrypted via Fernet using AES in CBC mode.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"610\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2a-1024x610.png\" alt=\"\" class=\"wp-image-13166\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2a-1024x610.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2a-300x179.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2a-768x458.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2a-370x221.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2a-270x161.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2a-740x441.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2a.png 1535w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 6.<\/em><\/strong><em>&nbsp;Decrypted script in CyberChef<\/em> &nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Use this <a href=\"https:\/\/gchq.github.io\/CyberChef\/#recipe=Fernet_Decrypt('_42xi_g54tAqgEXHzc3eqvJJkkX3fQAqGisHeNmpKjM%3D')&amp;input=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\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">decryption recipe in CyberChef<\/a> for decrypting the initial and all the following stages, as the algorithm remains unchanged, only the key changes.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Main Stealer Module&nbsp;<\/h3>\n\n\n\n<p>Once we decrypt the payload, we can see the code of the stealer\u2019s main module.&nbsp;<\/p>\n\n\n\n<p>First, it checks whether the directory &#8220;%LOCALAPPDATA%\/HD Realtek Audio Player&#8221; exists on the victim&#8217;s computer. If not, it creates it and continues execution. This is a technique used by the malware to check if the machine has already been infected.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The malware then begins to steal a variety of data, including:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Login credentials, cookies, and extension data from Chromium-based browsers and cookie data from Mozilla Firefox&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"569\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2b-1024x569.png\" alt=\"\" class=\"wp-image-13169\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2b-1024x569.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2b-300x167.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2b-768x427.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2b-370x206.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2b-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2b-740x411.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image2b.png 1074w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 7<\/em><\/strong><em>. Code for stealing Firefox cookies<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Data from apps for managing cryptocurrency wallets&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Discord tokens and Telegram authorization data&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Files with specific names and extensions from user directories&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>There are also two actions performed by the malware that stand out from the rest and are worth a more detailed analysis:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>To steal cookies, Pentagon launches Chromium-based browsers in debug mode.&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>The malware also replaces <em>app.asar <\/em>files used by Exodus and Atomic wallets.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Let\u2019s take a closer look at them.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Injection into Atomic and Exodus Crypto Wallets<\/strong>&nbsp;<\/h3>\n\n\n\n<p>The stealer can inject into two popular cryptocurrency wallet management applications: Atomic and Exodus. Both use <a href=\"https:\/\/www.electronjs.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Electron<\/a>, which stores JavaScript code in app.asar files.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The injection performed by Pentagon involves replacing these files with attacker-patched versions.&nbsp;<\/p>\n\n\n\n<p>The image above shows the stealer overwriting the <em>app.asar <\/em>content of both applications with data from its command server. Additionally, a loguuid is written to the LICENSE files in both cases, which allows the attackers to identify the victim.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"751\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/6-1024x751.png\" alt=\"\" class=\"wp-image-13173\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/6-1024x751.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/6-300x220.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/6-768x563.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/6-1536x1126.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/6-370x271.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/6-270x198.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/6-740x542.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/6-80x60.png 80w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/6.png 1569w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 8<\/em><\/strong><em>. Code for injecting into Atomic and Exodus<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>But why did they overwrite app.asar and what specific changes were made?&nbsp;&nbsp;<\/p>\n\n\n\n<p>Since .asar files are archives containing .js files, we can unpack them with 7-Zip with a <a href=\"https:\/\/www.tc4shell.com\/en\/7zip\/asar\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">special plugin<\/a> to analyze the code. As expected, the goal here is to obtain the user&#8217;s mnemonic and password. The images below illustrate how this is done.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"622\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/7-1-1024x622.png\" alt=\"\" class=\"wp-image-13175\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/7-1-1024x622.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/7-1-300x182.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/7-1-768x466.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/7-1-1536x933.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/7-1-370x225.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/7-1-270x164.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/7-1-740x449.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/7-1.png 2030w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 9<\/em><\/strong><em>. Collection of the user data in Atomic Wallet<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The images show how a packet, containing the user&#8217;s password, mnemonic, and wallet type, is formed. One of the headers includes the loguuid.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"656\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/8-1-1024x656.png\" alt=\"\" class=\"wp-image-13178\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/8-1-1024x656.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/8-1-300x192.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/8-1-768x492.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/8-1-370x237.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/8-1-270x173.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/8-1-740x474.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/8-1.png 1401w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 10<\/em><\/strong><em>. Collection of the user data in Exodus Wallet<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>It&#8217;s worth noting that the attacker clearly used <a href=\"https:\/\/github.com\/hackirby\/wallets-injection?tab=readme-ov-file\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Inject_PoC<\/a> in this part of the operation, as indicated by the code similarity.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For example, the Atomic Wallet section from the PoC repository looks like this:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1014\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/9-1-1024x1014.png\" alt=\"\" class=\"wp-image-13180\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/9-1-1024x1014.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/9-1-300x297.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/9-1-150x150.png 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/9-1-768x761.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/9-1-70x70.png 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/9-1-370x366.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/9-1-270x267.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/9-1-740x733.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/9-1.png 1148w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 11<\/em><\/strong><em>. The attacker reused code for injecting into Atomic<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The similarity is evident. The attacker just simplified the packet. In the case of Atomic, even the application version matches.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For Exodus, the code segment from the repository looks like this:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"952\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/10-952x1024.png\" alt=\"\" class=\"wp-image-13182\" style=\"width:508px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/10-952x1024.png 952w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/10-279x300.png 279w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/10-768x826.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/10-370x398.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/10-270x290.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/10-740x796.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/10.png 1140w\" sizes=\"(max-width: 952px) 100vw, 952px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 12<\/em><\/strong><em>. Inject_PoC code for injecting into Exodus<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Launching Browsers in Debug Mode<\/strong>&nbsp;<\/h3>\n\n\n\n<p>This is a <a href=\"https:\/\/mango.pdf.zone\/stealing-chrome-cookies-without-a-password\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">common technique<\/a> for obtaining cookies in unencrypted form.&nbsp;<\/p>\n\n\n\n<p>In short, this method causes some Chromium-based browsers to provide cookies in plaintext. If the standard method of extracting cookies from files were used, they would need to be decrypted, which can be problematic.&nbsp;<\/p>\n\n\n\n<p>These browsers use the DPAPI mechanism to protect sensitive data. If the malware is executed in the session of a user whose password was used in the encryption process, a call to the UnProtect() function may be enough to decrypt the data. Otherwise, decryption can be extremely difficult. In addition, the task may be complicated, for example, by the <a href=\"https:\/\/security.googleblog.com\/2024\/07\/improving-security-of-chrome-cookies-on.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Application-Bound (App-Bound) Encryption method<\/a> used in the latest versions of Chrome.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s how debugging helps to get cookies in an easier way:&nbsp;&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>The browser is launched with a specified debugging port (default 9222).&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>A GET request is made to http:\/\/localhost:9222\/json, which returns a JSON response containing webSocketDebuggerUrl.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>Commands can be sent to this URL using the WebSocket protocol.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li>Using the Network.getAllCookies command, the desired cookies are obtained, already decrypted by the browser.&nbsp;<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"368\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/11-1024x368.png\" alt=\"\" class=\"wp-image-13185\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/11-1024x368.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/11-300x108.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/11-768x276.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/11-1536x553.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/11-370x133.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/11-270x97.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/11-740x266.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/11.png 1946w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 13.<\/em><\/strong><em> Code for launching browsers in debug mode<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>This method explains the unusual behavior of relaunching browser, which piqued our interest when we first came across Pentagon\u2019s sample.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Decryption and Transition to the Next Stage: runpython.py&nbsp;<\/h3>\n\n\n\n<p>The final part of the stealer module is the decryption and launch of the next stage, runpython.py.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"208\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/12-1024x208.png\" alt=\"\" class=\"wp-image-13187\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/12-1024x208.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/12-300x61.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/12-768x156.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/12-1536x313.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/12-370x75.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/12-270x55.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/12-740x151.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/12.png 1970w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 14<\/em><\/strong><em>. Code for initializing the next stage<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Once we decrypt the payload, we can see the command used.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"765\" height=\"118\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3f.png\" alt=\"\" class=\"wp-image-13190\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3f.png 765w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3f-300x46.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3f-370x57.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3f-270x42.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3f-740x114.png 740w\" sizes=\"(max-width: 765px) 100vw, 765px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 15<\/em><\/strong><em>. Decrypted command for the next stage launch<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Following the URL inside the command reveals the dropper script used for launching runpython.py.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"318\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/13-1024x318.png\" alt=\"\" class=\"wp-image-13192\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/13-1024x318.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/13-300x93.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/13-768x238.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/13-1536x477.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/13-370x115.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/13-270x84.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/13-740x230.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/13.png 1982w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 16<\/em><\/strong><em>. Runpython.py dropper script<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Yet Another Stage: Functionality of runpython.py&nbsp;<\/h3>\n\n\n\n<p>Inside runpython.py, we can see the following bat-file:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"757\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/14-1-1024x757.png\" alt=\"\" class=\"wp-image-13195\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/14-1-1024x757.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/14-1-300x222.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/14-1-768x567.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/14-1-1536x1135.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/14-1-370x273.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/14-1-270x199.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/14-1-740x547.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/14-1-80x60.png 80w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/14-1.png 1685w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 17<\/em><\/strong><em>. Bat-file loader of the next stage<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>It follows this algorithm:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Checks if it has access to system files, indicating admin rights.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>If not, creates a temporary VBS script to relaunch the current BAT script with admin rights.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>Creates the directory C:\\Windows\\WinEmptyfold as an infection indicator.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li>Runs PowerShell to add a Windows Defender exclusion, preventing it from scanning the C:\/ drive.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li>Downloads the next stage from a remote resource and executes it as RuntimeBroker.exe.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"6\" class=\"wp-block-list\">\n<li>Deletes files and directories used by the stealer.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>In all samples we have analyzed (<a href=\"https:\/\/app.any.run\/tasks\/722ad096-e108-4819-bc69-51123e039a5b\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">example<\/a>),&nbsp;Pentagon Stealer exclusively dropped Purecrypter which then deployed a miner. However, it is possible that there can be alternative payloads.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attack Chain and Timeline of Python-based Pentagon Stealer&nbsp;<\/h2>\n\n\n\n<p>Pentagon Stealer\u2019s chain of attack can be represented in the following way:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"569\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/15-1024x569.png\" alt=\"\" class=\"wp-image-13197\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/15-1024x569.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/15-300x167.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/15-768x427.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/15-1536x853.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/15-370x206.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/15-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/15-740x411.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/15.png 2045w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 18<\/em><\/strong><em>. Python-based Pentagon Stealer kill chain<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Let\u2019s now take a look at Pentagon\u2019s development timeline and see what methods the attackers used for delivering it to victims.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">March 2024: Typosquatting Campaign&nbsp;<\/h3>\n\n\n\n<p>One of the <a href=\"https:\/\/blog.phylum.io\/typosquatting-campaign-targets-python-developers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">earliest campaigns<\/a> we came across in our research involved masking Pentagon as popular PyPI Python packages using a technique called \u201ctyposquatting\u201d.&nbsp;<\/p>\n\n\n\n<p>In this version, the malware couldn&#8217;t steal Web Data from Chromium browsers, unencrypted cookies via browser debugging, or Telegram data. Additionally, the protocol for interacting with the C2 server was more primitive: all information was written to files, which were then sent to funcaptcha[.]ru\/delivery.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">September 2024: 1312 Stealer&nbsp;<\/h3>\n\n\n\n<p>In another campaign, the stealer was available under the name 1312 Stealer. ANY.RUN\u2019s <a href=\"https:\/\/app.any.run\/submissions\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Public submissions<\/a> help us track changes in the admin panel.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/41cd2a5b-2306-4881-a053-2478d4fdf2e7\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">On September 2<\/a> 2024, it appeared as follows:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"581\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/16-1024x581.png\" alt=\"\" class=\"wp-image-13199\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/16-1024x581.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/16-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/16-768x435.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/16-370x210.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/16-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/16-740x420.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/16.png 1263w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 19<\/em><\/strong><em>. 1312 Stealer Admin Panel on 02.09.24<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>By <a href=\"https:\/\/app.any.run\/tasks\/c4623952-d84d-46cc-8951-9ef27802629a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">September 23<\/a>, it looked like this:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"581\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/17-1024x581.png\" alt=\"\" class=\"wp-image-13201\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/17-1024x581.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/17-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/17-768x436.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/17-370x210.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/17-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/17-740x420.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/17.png 1270w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 20<\/em><\/strong><em>. 1312 Stealer Admin panel on 23.09.24<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>A Telegram account is listed for contact, previously seen in Pentagon Stealer Admin Panel.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This campaign used two domains: 1312services[.]ru and 1312stealing[.]ru.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The code for this version can <a href=\"https:\/\/github.com\/Sallie-May\/1312services.ru-Stealer\" target=\"_blank\" rel=\"noreferrer noopener\">be viewed here<\/a>.&nbsp;<\/p>\n\n\n\n<p>1312\u2019s new functionality included stealing Web Data from Chromium-based browsers and Telegram tdata. Communication with the C2 server changed: passwords were sent to 1312services[.]ru\/pw, Web Data to 1312services[.]ru\/webdata, and everything else to 1312services[.]ru\/delivery.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Other Campaigns&nbsp;<\/h3>\n\n\n\n<p>There are also versions of 1312 Stealer, which include <a href=\"https:\/\/github.com\/Sallie-May\/Acab-Stealer\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Acab Stealer<\/a> and <a href=\"https:\/\/www.cyfirma.com\/research\/vilsa-stealer\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Vilsa Stealer<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Golang Version of Pentagon Stealer&nbsp;<\/h2>\n\n\n\n<p>Now, it\u2019s time to dissect the latest version of the stealer, which is currently being actively distributed. It kept the functionality of the Python version, but with some improvements described below.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"719\" height=\"531\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-12.png\" alt=\"\" class=\"wp-image-13148\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-12.png 719w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-12-300x222.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-12-370x273.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-12-270x199.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image-12-80x60.png 80w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 21<\/em><\/strong><em>. Detect It Easy identified the sample as being written in Go<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/9c58dc61-5a7c-484c-a68e-4d13767939c4\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View sandbox analysis of the Golang version<\/a>&nbsp;<\/p>\n\n\n\n<p>Unlike its Python counterpart, this variant does not download subsequent stages independently. Instead, it is used as one of the modules in the attack chain, as shown by sandbox analysis. Learn more about this in the &#8216;Infection Methods&#8217; section.&nbsp;<\/p>\n\n\n\n<p>Upon launch, the stealer hides its console window and checks for the directory %LOCALAPPDATA%\\Realtek HD Audio Service on the victim&#8217;s computer, indicating previous execution.&nbsp;&nbsp;<\/p>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"Learn to analyze malware in a sandbox\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Learn to analyze cyber threats<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nFollow along a detailed guide to using ANY.RUN&#8217;s <span class=\"highlight\">Interactive Sandbox<\/span> for malware and phishing analysis\n<br \/>\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-in-a-sandbox\/\"><div class=\"cta__split-link\">Read full guide<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<p>It then begins collecting information as described. The main improvement, unique to the Golang version, is the ability to steal data not only from Firefox but also from other Gecko-based browsers, including:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-1 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li>Zen&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SeaMonkey&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Waterfox&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>K-Meleon&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Thunderbird&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IceDragon&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cyberfox&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>BlackHaw&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pale Moon&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mercury&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Librewolf&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p>The malware now can steal passwords from these browsers, in addition to cookies. The rest of the functionality remains unchanged, though the programming language has been altered.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">C2 Communication Protocol&nbsp;<\/h3>\n\n\n\n<p>Regarding interaction with the C2 server, recent malware versions use two domains: <em>stealer[.]cy<\/em> and <em>pentagon[.]cy<\/em>. The communication method is identical in both the latest Python and Golang versions.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"606\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/18-1-606x1024.png\" alt=\"\" class=\"wp-image-13206\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/18-1-606x1024.png 606w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/18-1-177x300.png 177w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/18-1-768x1299.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/18-1-908x1536.png 908w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/18-1-1211x2048.png 1211w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/18-1-370x626.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/18-1-270x457.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/18-1-740x1251.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/18-1.png 1362w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 22<\/em><\/strong><em>. How Pentagon Stealer communicate with C2<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The stealer and command server communicate via HTTP requests. Upon log creation (create_log()), the victim sends the number of collected passwords, cookies, Discord tokens, and names of all collected files. The server responds with either a rejection or a log_uuid, which is subsequently used as the victim&#8217;s identifier, replacing the previously hardcoded uuid.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"93\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image39-1.png\" alt=\"\" class=\"wp-image-13210\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image39-1.png 720w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image39-1-300x39.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image39-1-370x48.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image39-1-270x35.png 270w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 23<\/em><\/strong><em>. POST request to pentagon[.]cy\/create_log shown in ANY.RUN<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"93\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image39.png\" alt=\"\" class=\"wp-image-13209\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image39.png 720w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image39-300x39.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image39-370x48.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image39-270x35.png 270w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 24.<\/em><\/strong><em> C2 response<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Infection Methods&nbsp;<\/h3>\n\n\n\n<p>Notably, the Golang version of the stealer lacks any encryption of its code and strings, which is unusual since each subsequent stage of its Python counterpart is encrypted using AES. This suggests the possible existence of a dropper or loader.&nbsp;&nbsp;<\/p>\n\n\n\n<p>A search in TI Lookup involving the stealer yielded the <a href=\"https:\/\/app.any.run\/tasks\/10345e59-46a2-4800-8adf-38155af255b7\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">following analysis<\/a>.&nbsp;<\/p>\n\n\n\n<p>Here is the sample\u2019s execution chain:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"605\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/21-1024x605.png\" alt=\"\" class=\"wp-image-13212\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/21-1024x605.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/21-300x177.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/21-768x454.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/21-370x219.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/21-270x160.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/21-740x438.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/21.png 1534w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 25<\/em><\/strong><em>. Attack chain involving the Golang version&nbsp;<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The initial attack stage involved running an NSIS installer named BlumBot.exe. This installer executed a VBS script that displayed a familiar message, \u201cvcruntime140.dll is missing from your computer\u201d. It then proceeds to launch the next stage, Installer.exe.&nbsp;<\/p>\n\n\n\n<p>Notably, reverse-engineering BlumBot.exe was not necessary to uncover this. A tool capable of unpacking NSIS installers and extracting the .nsi script was enough. In our investigation, we used <a href=\"https:\/\/github.com\/M2Team\/NanaZip?tab=readme-ov-file\" target=\"_blank\" rel=\"noreferrer noopener\">NanaZip<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>NSIS installer in NanaZip:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"247\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/22-1024x247.png\" alt=\"\" class=\"wp-image-13214\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/22-1024x247.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/22-300x72.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/22-768x185.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/22-370x89.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/22-270x65.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/22-740x179.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/22.png 1123w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 26<\/em><\/strong><em>. NSIS installer in NanaZip<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Fragment of the .nsi script:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"622\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/23-1-1024x622.png\" alt=\"\" class=\"wp-image-13217\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/23-1-1024x622.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/23-1-300x182.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/23-1-768x467.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/23-1-370x225.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/23-1-270x164.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/23-1-740x450.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/23-1.png 1432w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 27<\/em><\/strong><em>. Piece of .nsi script<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Installer.exe is a loader written in Golang. Its sole purpose is to download and execute two files, ByPass.exe and Main.exe, from biteblob[.]com, and then send a Telegram message confirming successful execution.&nbsp;<\/p>\n\n\n\n<p>Following this, the stealer and a second module, which is actually a miner, are executed.&nbsp;<\/p>\n\n\n\n<p>This is just one example of how Pentagon Stealer is used. In Public Submissions, you can frequently observe samples of various malware using this stealer as one stage in an attack chain.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Further Evolution of Pentagon Stealer&nbsp;<\/h2>\n\n\n\n<p>As mentioned, this malware has appeared under various names, although its core functionality remains unchanged, with only minor logical modifications. This trend continues today.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For instance, we recently discovered samples of a stealer with identical code but named BLX Stealer, as indicated by code strings and description in <a href=\"https:\/\/www.cyfirma.com\/research\/blx-stealer\/\" target=\"_blank\" rel=\"noreferrer noopener\">this article<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/75fbe107-c04f-42ea-ad78-e13ecfa67eef\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=pentagon_stealer&amp;utm_term=290425&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View sandbox analysis of BLX Stealer<\/a>&nbsp;<\/p>\n\n\n\n<p>The attack consists of multiple stages, but we focus on the stealer itself.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This version is written in Python, like its predecessors, but is packaged into an executable using PyInstaller. With <a href=\"https:\/\/github.com\/extremecoders-re\/pyinstxtractor\" target=\"_blank\" rel=\"noreferrer noopener\">pyinstxtractor<\/a> and <a href=\"https:\/\/pylingual.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">pylingual.io<\/a>, we successfully reconstructed the stealer&#8217;s source code for analysis.&nbsp;<\/p>\n\n\n\n<p>Regarding functionality, this version did not branch out from the latest Pentagon Stealer, as it lacks crypto-wallet injection and data theft from Gecko-based browsers other than Mozilla Firefox.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Yet, it has unique features not previously observed:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Extracts clipboard content&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Captures screenshots&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reads system information&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Retrieves additional Discord user information, including two-factor authentication status, Nitro subscription type, and user badges&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Steals Steam and Epic Games account data&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The communication protocol with the C2 server is also noteworthy. The stealer does not send files directly; instead, it uploads them to gofile.io and then sends the access link to http[:]\/\/&lt;ip&gt;\/tgproxy\/{USERID}\/.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"599\" height=\"64\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3e.png\" alt=\"\" class=\"wp-image-13220\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3e.png 599w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3e-300x32.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3e-370x40.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3e-270x29.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/04\/image3e-585x64.png 585w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Image 28<\/em><\/strong><em>. Example of C2 communication<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We also discovered a sample with the capability to steal NordVPN configuration files (user.config).&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp; <\/h2>\n\n\n\n<p>Pentagon Stealer cannot be considered malware capable of complex targeted attacks due to its simplicity. Its development history shows that authors often merely changed the domain, leaving the functionality intact. However, a year has passed since its first mention, and it has undergone modifications, with the most significant changes occurring this year. The story is far from over, as new, more complex versions continue to emerge, albeit from different authors.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IOCs and TTPs<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">MITRE ATT&amp;CK&nbsp;<\/h3>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-235\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"3\"\n           data-rows=\"17\"\n           data-wpID=\"235\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Tactics\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Techniques\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell \"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Description\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        TA0002: Execution\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1059.001: Command and Scripting Interpreter: PowerShell\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C3\"\n                    data-col-index=\"2\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Disables disk C: scanning using Microsoft Defender in the Python version\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1059.003: Command and Scripting Interpreter: Windows Command Shell\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C4\"\n                    data-col-index=\"2\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Executes a .bat file to download the next stage in the Python version\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1059.005: Command and Scripting Interpreter: Visual Basic\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C5\"\n                    data-col-index=\"2\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Launches a .vbs script to escalate privileges in the Python version\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        TA005: Defense Evasion\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"C6\"\n                    data-col-index=\"2\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A7\"\n                    data-col-index=\"0\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B7\"\n                    data-col-index=\"1\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1140: Deobfuscate\/Decode Files or Information\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C7\"\n                    data-col-index=\"2\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Decrypts Python stages using Fernet\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A8\"\n                    data-col-index=\"0\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        TA0006: Credential Access\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"B8\"\n                    data-col-index=\"1\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"C8\"\n                    data-col-index=\"2\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A9\"\n                    data-col-index=\"0\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B9\"\n                    data-col-index=\"1\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1555.003: Credentials from Web Browsers\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C9\"\n                    data-col-index=\"2\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Steals passwords from various browsers\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A10\"\n                    data-col-index=\"0\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B10\"\n                    data-col-index=\"1\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1539: Steal Web Session Cookie\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C10\"\n                    data-col-index=\"2\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Steals cookies from various browsers\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A11\"\n                    data-col-index=\"0\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        TA0009: Collection\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"B11\"\n                    data-col-index=\"1\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"C11\"\n                    data-col-index=\"2\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A12\"\n                    data-col-index=\"0\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B12\"\n                    data-col-index=\"1\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1005: Data from Local System\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C12\"\n                    data-col-index=\"2\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Collects files with specific names and extensions from user directories\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A13\"\n                    data-col-index=\"0\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        TA0011: Command and Control \t\t\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"B13\"\n                    data-col-index=\"1\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"C13\"\n                    data-col-index=\"2\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A14\"\n                    data-col-index=\"0\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B14\"\n                    data-col-index=\"1\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1071.001: Application Layer Protocol\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C14\"\n                    data-col-index=\"2\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Sends collected data to the command server\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A15\"\n                    data-col-index=\"0\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B15\"\n                    data-col-index=\"1\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1659: Content Injection\u00a0\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C15\"\n                    data-col-index=\"2\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Injects custom JavaScript code into cryptocurrency management software\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A16\"\n                    data-col-index=\"0\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        TA0040: Impact\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"B16\"\n                    data-col-index=\"1\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                                <td class=\"wpdt-cell  wpdt-empty-cell \"\n                                            data-cell-id=\"C16\"\n                    data-col-index=\"2\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                                            <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A17\"\n                    data-col-index=\"0\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B17\"\n                    data-col-index=\"1\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1657: Financial Theft\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"C17\"\n                    data-col-index=\"2\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Steals credentials from cryptocurrency management software\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-235'>\ntable#wpdtSimpleTable-235{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-235 td, table.wpdtSimpleTable235 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<h3 class=\"wp-block-heading\">IOCs<\/h3>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-236\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"2\"\n           data-rows=\"5\"\n           data-wpID=\"236\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        Title\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        Description\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Name\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        build_59.exe\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        MD5\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        a1726ff80b020aa291bdcbb21159c618\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SHA1\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        51c9978e60995174ed2b6b8cc5e8e1a973b66337\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SHA256\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0411589551ab684892e3cc776674df0f07bcdbb931c29da93c2afd08fe077336\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-236'>\ntable#wpdtSimpleTable-236{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-236 td, table.wpdtSimpleTable236 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p><strong>DNS requests<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>pentagon[.]cy&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>stealer[.]cy&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>HTTP\/HTTPS requests<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https:\/\/pentagon[.]cy\/create_log&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https:\/\/pentagon[.]cy\/log_data&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https:\/\/pentagon[.]cy\/log_files&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https:\/\/pentagon[.]cy\/exodus&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https:\/\/pentagon[.]cy\/atomic &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https:\/\/pentagon[.]cy\/wallet_injection&nbsp;<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The current article provides technical analysis of an emerging malware named Pentagon Stealer. The research has been prepared by the analyst team at ANY.RUN.&nbsp; Key Takeaways&nbsp; How We Discovered Pentagon Stealer&nbsp; In early March of this year, when browsing Public submissions, the ANY.RUN team came across an interesting malware sample written in Golang.&nbsp; View sandbox [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13236,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,15,34,40],"class_list":["post-13137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pentagon Stealer: Go and Python Malware Targeting Crypto\u00a0<\/title>\n<meta name=\"description\" content=\"Read in-depth technical analysis of Pentagon Stealer, an evolving malware with Python &amp; Golang variants that targets crypto wallets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Pentagon Stealer: Go and Python Malware with Crypto Theft Capabilities\u00a0\",\"datePublished\":\"2025-04-29T12:06:46+00:00\",\"dateModified\":\"2025-07-17T08:22:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/\"},\"wordCount\":2767,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/\",\"name\":\"Pentagon Stealer: Go and Python Malware Targeting Crypto\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-04-29T12:06:46+00:00\",\"dateModified\":\"2025-07-17T08:22:10+00:00\",\"description\":\"Read in-depth technical analysis of Pentagon Stealer, an evolving malware with Python & Golang variants that targets crypto wallets.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Pentagon Stealer: Go and Python Malware with Crypto Theft Capabilities\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pentagon Stealer: Go and Python Malware Targeting Crypto\u00a0","description":"Read in-depth technical analysis of Pentagon Stealer, an evolving malware with Python & Golang variants that targets crypto wallets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Pentagon Stealer: Go and Python Malware with Crypto Theft Capabilities\u00a0","datePublished":"2025-04-29T12:06:46+00:00","dateModified":"2025-07-17T08:22:10+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/"},"wordCount":2767,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/","url":"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/","name":"Pentagon Stealer: Go and Python Malware Targeting Crypto\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-04-29T12:06:46+00:00","dateModified":"2025-07-17T08:22:10+00:00","description":"Read in-depth technical analysis of Pentagon Stealer, an evolving malware with Python & Golang variants that targets crypto wallets.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Pentagon Stealer: Go and Python Malware with Crypto Theft Capabilities\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13137"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=13137"}],"version-history":[{"count":50,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13137\/revisions"}],"predecessor-version":[{"id":13244,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13137\/revisions\/13244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/13236"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=13137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=13137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=13137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}