Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

How to analyze Stealer with ANY.RUN

Top malware of this type

Family
Type
Trend changes
Tasks overall
  • 2

    LokiBot

    Stealer
    0,0,60,326,469,534,915,921,779,879,758,948,658,581,728,1378,475,482,406,365,420,639,657,649,797,669,915,519,512,754,576,444,484,270,398,416,432,311,363,266,71,115,184,125,146,131,143,144,176,930,852,640
    19
    25247
  • 3

    DeerStealer

    Stealer
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,50,86,14,6,4,24,53,58,31
    126
    402
  • 4

    Salvador Stealer

    Stealer
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,5,0,1,0
    168
    16
  • 5

    ACR Stealer

    Stealer
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,24,32,16
    153
    119
  • 6

    Lumma

    Stealer
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,148,450,1133,960,206,176,270,955,2900,5534,4735,4270,4906,3702,5167,2794
    8
    40972
  • 7

    WhiteSnake

    Stealer
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,9,4,14,18,4,5,9,26,14,6,8,13,33,25
    141
    247
  • 8

    Stealc

    Stealer
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,9,83,1268,8923,3097,377,352,400,537,2001,5677,2036,666,613,639,1409,2037
    27
    15029
  • 9

    MetaStealer

    Stealer
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,36,72,45,391,706,933,485,195,191,164,127,226,118
    59
    3597
  • 10

    RedLine

    Stealer
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,31,60,80,155,333,498,613,1746,2259,2906,3499,3245,2741,2369,2703,2332,2873,2607,5347,4032,7654,5705,7522,3169,730,372,505,741,816,2824,357,490,437,490,1416,1120
    7
    45595
  • 11

    StrelaStealer

    Stealer
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,646,23,111,139,7,10,13,4,4
    103
    872
  • Last Seen at

    Recent blog posts

    post image
    ANY.RUN Wins Trailblazing Threat Intelligence...
    watchers 403
    comments 0
    post image
    Unified Security for Fast Response: All ANY.R...
    watchers 560
    comments 0
    post image
    Release Notes: ANY.RUN & ThreatQ Integrat...
    watchers 2633
    comments 0

    What is stealer malware?

    Stealer malware is a type of Trojan malware that is designed to steal sensitive information from a victim's computer, including:

    • Login credentials for online accounts, such as banking, social media, and email accounts.
    • Financial information, such as credit card numbers and bank account numbers.
    • Personal information, such as names, addresses, and Social Security numbers.
    • Intellectual property, such as trade secrets and customer data.

    Stealers are often distributed through phishing email attachments and links, malicious websites, and even infected USB drives.

    Stealer malware is a serious threat to businesses and individuals alike. It can not only compromise victims’ privacy but also enable threat actors to undertake further harmful activities, such as ransomware attacks or data breaches.

    Get started today for free

    Analyze malware and phishing in a fully-interactive sandbox

    Create free account

    What can a stealer do to a computer?

    The core functionality of stealer malware can vary depending on its type. However, the most common features include:

    • Information theft: Such malware can steal a wide range of sensitive data from an infected computer, including passwords and credit card numbers, email contacts, messaging app data, browser history and cookies.
    • File theft: It can also exfiltrate personal files and business files from the compromised computer to the attacker’s server.
    • Recording keystrokes: Many stealers are equipped with the ability to track the keyboard activity of the victim.
    • Taking screenshots: Stealer malware can take screenshots of the victim's computer screen.
    • Spreading through network connections: Some types of stealer malware can spread to other computers on the same network.
    • Cryptocurrency theft: Stealer malware can be used to get hold of victims’ crypto.
    • Dropping other malware: Some stealers can have an additional functionality of deploying extra payloads on the infected system.

    Some types of stealer malware can be designed for a specific purpose. For instance, Laplas Clipper is a form of stealer that exclusively targets cryptocurrency users. This malicious operation involves gaining access to the clipboard in order to identify cryptocurrency addresses. The attacker then manipulates the addresses by replacing them with similar ones, deceiving the victim into unknowingly sending their funds directly into the attacker's wallet.

    How do stealers spread?

    In the case of stealer malware, phishing emails constitute the main attacker vector employed by threat actors. They create and distribute deceptive and fraudulent emails that aim to trick unsuspecting recipients into taking actions that could compromise their digital security. Most of the time, such messages mimic those sent by trusted sources, such as banks or popular online services, making them difficult to identify.

    Once the recipient falls prey to the phishing email and clicks on the malicious link or opens the suspicious attachment, a stealer can infiltrate their computer system, which can eventually lead to financial loss to identity theft.

    Alternatively, criminals often utilize fake websites, advertised through Google Ads, as well as pirated software that has built-in malware. There are also stealers that are usually dropped by loaders, including SmokeLoader, which is a modular malicious software intended for gaining initial foothold on a compromised system to deliver other payloads, including stealers.

    How can a stealer gain access to a computer?

    Let’s see how a typical malware password stealer accesses a system using the sample of RedLine uploaded to the ANY.RUN sandbox for analysis. The infection chain begins with the victim downloading a malicious file, which can be an Office document or an executable (often inside an archive).

    Once the user launches the file, an execution process begins, which leads to the stealer being deployed on the system. The malware then creates a child process that is responsible for the malicious activity itself. This can involve stealing information from the compromised including passwords, and sending the collected data to the command and control server (C2) operated by the attacker. The information transmitted can be encrypted.

    The lifecycle of RedLine The lifecycle of RedLine demonstrated by ANY.RUN

    What are examples of the most persistent stealers today?

    The ever-evolving threat landscape is constantly shifting, with stealers that are popular today potentially disappearing completely tomorrow. To stay updated on the latest developments in malware and collect new IOCs and samples, utilize ANY.RUN’s Malware Trends Tracker.

    These are the most persistent stealers according to the service:

    • RedLine: This stealer poses a significant threat to users by collecting their private information and distributing various damaging programs. It is a versatile malware that can pull data from browsers and other applications.
    • Formbook: It is an infostealer that is available as a service practically to anyone who is interested in how to get the password stealer malware. FormBook is designed to extract different types of information from compromised systems. Additionally, it has the ability to search for, access, and manipulate files, as well as capture screenshots.
    • Arkei: Another stealer available as a Malware-as-a-Service that, once installed, is capable of pulling browser autosave forms, login credentials and passwords, files, and cryptocurrency wallets from the infected machine.
    • Agent Tesla: A spyware, which discreetly gathers data regarding the activities of its targets by capturing keystrokes and monitoring user interactions. It is deceptively promoted as genuine software. See how Agent Tesla infection takes place and collect IOCs using its sample uploaded to ANY.RUN.

    Agent Tesla process tree Agent Tesla’s process tree demonstrated by ANY.RUN

    How can I detect a stealer?

    Stealers are an extremely widespread type of malware that is often challenging to detect because of their evasive behavior. On top of that, due to lax security policies, many organizations fall victim to phishing campaigns that cause their information to be exposed to attackers.

    To prevent infection, organizations have to maintain strong security posture including by using sandboxing solutions. By uploading any suspicious file or URL to the ANY.RUN malware sandbox, you can quickly identify whether they pose any threat, as well as receive a stealer malware intelligence report containing IOCs and other information required for future detection.

    ANY.RUN lets users interact with files, links, and the infected system in a safe VM environment like they would on a normal computer to ensure comprehensive analysis.

    Try ANY.RUN for free – request a demo!

    HAVE A LOOK AT

    Salvador Stealer screenshot
    Salvador Stealer
    salvador
    Salvador Stealer is a powerful, information-stealing Android malware designed to silently infiltrate systems, extract sensitive data, and exfiltrate it to cybercriminals. Often sold on underground forums, it is part of the growing ecosystem of “stealers-as-a-service” (SaaS) tools that target individuals and organizations alike.
    Read More
    SVCStealer screenshot
    SVCStealer
    svcstealer
    SVCStealer is an information-stealing malware targeting sensitive user data through spear-phishing email attachments. It systematically extracts credentials, financial data, and system information from various applications, including browsers and messaging platforms.
    Read More
    RedLine screenshot
    RedLine
    redline stealer redline stealer malware
    RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.
    Read More
    X-Files screenshot
    X-Files
    xfiles
    X-FILES Stealer is a sophisticated malware designed to infiltrate systems and steal sensitive information, targeting login credentials for email, social media, and other personal accounts. It captures data and transmits it back to the attacker’s command-and-control server. X-FILES Stealer employs advanced evasion techniques to avoid detection, making it a persistent threat in the cyber landscape.
    Read More
    WhiteSnake screenshot
    WhiteSnake
    whitesnake
    WhiteSnake is a stealer with advanced remote access capabilities. The attackers using this malicious software can control infected computers and carry out different malicious activities, including stealing sensitive files and data, recording audio, and logging keystrokes. WhiteSnake is sold on underground forums and often spreads through phishing emails.
    Read More
    MetaStealer screenshot
    MetaStealer
    metastealer
    MetaStealer is an info-stealing malware primarily targeting sensitive data like login credentials, payment details, and browser history. It typically infects systems via phishing emails or malicious downloads and can exfiltrate data to a command and control (C2) server. MetaStealer is known for its stealthy techniques, including evasion and persistence mechanisms, which make it difficult to detect. This malware has been actively used in various cyberattacks, particularly for financial theft and credential harvesting from individuals and organizations.
    Read More