Security News New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data

Parkinsond

Level 18
Thread author
Dec 6, 2023
895
A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages.

"Based on a similar self-deletion technique observed in Latrodectus, EDDIESTEALER is capable of deleting itself through NTFS Alternate Data Streams renaming, to bypass file locks," Elastic noted.

Another noteworthy feature built into the stealer is its ability to bypass Chromium's app-bound encryption to gain access to unencrypted sensitive data, such as cookies. This is accomplished by including a Rust implementation of ChromeKatz, an open-source tool that can dump cookies and credentials from the memory of Chromium-based browsers.

Katz Stealer, like EDDIESTEALER, is engineered to circumvent Chrome's app-bound encryption, but in a different way by employing DLL injection to obtain the encryption key without administrator privileges and use it to decrypt encrypted cookies and passwords from Chromium-based browsers.

 

Khushal

Level 4
Verified
Well-known
Apr 4, 2024
150
The complete list of IOCs was not provided in the report. Only two script based malware were mentioned which were first stages of each of the exe(s) mentioned in the report. For example: sample d905ceb30816788de5ad6fa4fe108a202182dd579075c6c95b0fb26ed5520daa mentioned in the report has its first stage loader js VirusTotal not mentioned in the report which had six detections at the time of its initial upload.
1748672086414.png

1748672062308.png
 

Parkinsond

Level 18
Thread author
Dec 6, 2023
895
The complete list of IOCs was not provided in the report. Only two script based malware were mentioned which were first stages of each of the exe(s) mentioned in the report. For example: sample d905ceb30816788de5ad6fa4fe108a202182dd579075c6c95b0fb26ed5520daa mentioned in the report has its first stage loader js VirusTotal not mentioned in the report which had six detections at the time of its initial upload.View attachment 288868
View attachment 288867
Good job, Symantec 👏
 

Wrecker4923

Level 2
Apr 11, 2024
86
Great insight albeit i have analyzed few samples from the IOC list provided. It is a stealthy stealer nonetheless it's still shocking to see a lot of top 5 AVs unable to detect this threat as ofnow.
Even the top solutions will miss some. It's probably a mistake to assume that the greatest we are using will catch everything. A few will catch more than most.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
9,050
The complete list of IOCs was not provided in the report. Only two script based malware were mentioned which were first stages of each of the exe(s) mentioned in the report. For example: sample d905ceb30816788de5ad6fa4fe108a202182dd579075c6c95b0fb26ed5520daa mentioned in the report has its first stage loader js VirusTotal not mentioned in the report which had six detections at the time of its initial upload.

The JScript loader does nothing except download and execute an EXE file, resulting in low detection. However, all EXE samples downloaded by this script are currently well detected.

Anyway, the malware is relatively old (7 April 2025), so we do not know how efficient the detection was in the beginning (possibly not great).
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top