Eclipse Stealer Found on GitHub & Telegram

A newly identified information-stealing malware dubbed Eclipse Stealer has emerged on GitHub and Telegram.

It targets Windows systems to harvest sensitive credentials, cryptocurrency wallets, and session data from over 50 applications.

Developed in Python and actively updated, this stealer employs advanced anti-analysis techniques while advertising an “undetectable” operation.

Below is a technical breakdown of its capabilities and implications for cybersecurity professionals.

Eclipse Stealer’s Technical Capabilities

The malware demonstrates modular design with specialized components for data exfiltration:

Core data theft functions

  • Browser targeting: Extracts cookies, autofill data, and passwords from Gecko-based browsers (Firefox, Mullvad) and Chromium derivatives
  • Application targeting:
    • Game clients (Steam, Epic Games, Rockstar Games)
    • Messengers (Telegram, WhatsApp, Signal)
    • VPNs (NordVPN, ProtonVPN)
    • Cryptocurrency wallets via Atomic/Exodus injection
  • System profiling: Collects GPU specs, network details, antivirus lists, and file system metadata

Evasion mechanisms

  • UPX packer and PyArmor obfuscation to hinder static analysis
  • Anti-debugging checks and VM detection routines
  • Krakenfiles integration for encrypted C2 communication

Analysis Challenges & Recommended Tools

Security researchers face multiple hurdles when analyzing Eclipse Stealer samples:

Analysis TypeToolsKey Focus Areas
Static AnalysisCutter, PEiD, YARAObfuscated strings, packer identification
Dynamic AnalysisCuckoo Sandbox, ProcmonRegistry modifications, process injection
Network AnalysisWireshark, INetSimSimulated C2 traffic patterns

Critical steps for safe analysis:

  1. Deploy in VirtualBox/VMware with host-only networking
  2. Use REMnux Linux distro for tool integration
  3. Monitor with Sysinternals Process Explorer for real-time behavior tracking

Mitigation & Threat Response

Organizations should implement these defensive measures:

Immediate actions

  • Block IOCs from GitHub repo (hxxps://github[.]com/.../Eclipse-Stealer) and a Telegram channel (hxxps://t[.]me/+vSeyUIsW9chhMjEy)
  • Hunt for setup.bat files attempting Python environment modifications

Long-term strategies

  • Deploy YARA rules targeting: pythonrule Eclipse_Stealer { strings: $s1 = "JohnDoe287/Eclipse-Stealer" $s2 = "UPX Packer" nocase $s3 = "Krakenfiles" wide condition: 2 of them }
  • Enable EDR solutions with memory scanning for PyInstaller-packed binaries

The stealer’s rapid update cycle (39 versions in 8 months) underscores the need to continuously monitor underground channels.

While its current focus remains credential theft, the developers’ roadmap suggests plans for UAC bypass and cryptocurrency clipper modules, potentially expanding its attack surface.

Cybersecurity teams should prioritize sandbox-based analysis of suspected samples and share findings via MISP threat platforms.

Also Read:

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here