Friday, June 13, 2025
Homecyber securityNew StealC V2 Upgrade Targets Microsoft Installer Packages and PowerShell Scripts

New StealC V2 Upgrade Targets Microsoft Installer Packages and PowerShell Scripts

Published on

SIEM as a Service

Follow Us on Google News

StealC, a notorious information stealer and malware downloader first sold in January 2023, has rolled out its version 2 (V2) in March 2025 with sophisticated enhancements.

This latest iteration introduces a range of new capabilities, focusing on advanced payload delivery methods that include Microsoft Software Installer (MSI) packages and PowerShell scripts alongside traditional executable (EXE) files.

According to Zscaler Report, this development marks a notable evolution from StealC V1, expanding the malware’s reach and complexity.

- Advertisement - Google News

The redesigned control panel now features an integrated builder, allowing threat actors to customize payload delivery based on geolocation, hardware IDs (HWID), and installed software, making targeted attacks more precise and effective.

Additionally, StealC V2 incorporates RC4 encryption in its recent variants (post-version 2.1.1), a streamlined JSON-based command-and-control (C2) communication protocol, and server-side brute-forcing for credential harvesting, underscoring its active development and increasing threat potential.

Technical Innovations and Evolving Threat Mechanisms

Delving deeper into the technical upgrades, StealC V2 has abandoned several features of its predecessor, such as anti-VM checks and third-party DLL downloads, while introducing multi-monitor screenshot capture and a unified file grabber targeting crypto wallets, gaming applications, VPNs, email clients, and browsers.

PowerShell Scripts
Shows StealC V2’s communications workflow.

The malware, often packed with Themida for obfuscation, employs a two-stage deobfuscation process for strings and uses hardcoded RC4 keys for decrypting critical data, including an expiration date that terminates execution if surpassed.

Unlike StealC V1, the new version compiles for x64 architectures and supports Chrome v20 application-bound encryption, showcasing its adaptability to modern systems.

Payload execution is notably refined-MSI files are installed silently via msiexec.exe with retry mechanisms, while PowerShell scripts are executed remotely without retries, enhancing the malware’s stealth and persistence.

Network communication now leverages JSON requests with a unique random parameter to evade static signatures, and error codes from the C2 server provide detailed feedback on malformed requests, a significant improvement over V1’s rudimentary responses.

The control panel’s evolution, including Telegram bot integration for notifications and rule-based payload delivery, empowers operators to trigger specific loaders based on markers like “coinbase.com” in stolen data, illustrating a highly targeted approach to data exfiltration.

PowerShell Scripts
StealC V2 Marker rule which will search for coinbase.com

StealC V2’s ongoing updates, managed by its development team via ZIP archives containing builder templates and version configurations, ensure operators are locked into the latest versions, further complicating mitigation efforts.

Indicators of Compromise (IOCs)

TypeValue
Packed Sample SHA256 (StealC V2)0b921636568ee3e1f8ce71ff9c931da5675089ba796b65a6b212440425d63c8c
Packed Sample SHA256 (StealC V2)e205646761f59f23d5c8a8483f8a03a313d3b435b302d3a37061840b5cc084c3
Unpacked Sample SHA256 (StealC V2)a1b2aecdd1b37e0c7836f5c254398250363ea74013700d9a812c98269752f385
Unpacked Sample SHA256 (StealC V2)27c77167584ce803317eab2eb5db5963e9dfa86450237195f5723185361510dc
Dropped Payload SHA256 (Amadey)dd36c7d50cb05761391a7f65932193ec847d34f8ba1bb2f2a43ecf4985d911f4
Malware Dropping StealC V2 SHA256 (Amadey)87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
StealC V2 C2 Serverhttp://45.93.20[.]64/c090b39aa5004512.php
StealC V2 C2 Serverhttp://45.93.20[.]28/3d15e67552d448ff.php
StealC V2 C2 Serverhttp://88.214.48[.]93/ea2cb15d61cc476f.php

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...