StealC, a prominent infostealer and malware downloader on the cybercrime underground since early 2023, released its much-anticipated version 2 (V2), introducing significant enhancements in both functionality and evasion.
Most notably, V2 introduces advanced payload delivery mechanisms, supporting the execution of Microsoft Software Installer (MSI) packages and PowerShell scripts.
This capability, in addition to traditional EXE execution, marks a pivotal expansion in StealC’s ability to propagate and install secondary payloads within compromised environments.
The malware’s loader can now invoke msiexec.exe with the /passive flag for silent MSI installations, ensuring minimal user disruption and increasing stealth.
PowerShell-based payloads are executed directly using download-and-execute techniques, bypassing many conventional endpoint defenses.
Combined with a robust retry logic for EXE and MSI files, these features enhance payload reliability regardless of delivery channel.
Enhanced Encryption and Evasive C2 Communications
StealC V2’s communication protocol has transitioned to a streamlined, JSON-based format, augmented in recent variants by RC4 encryption for both command-and-control (C2) traffic and internal string obfuscation.

According to Threat Labz, this dual-layer encryption thwarts static signature detection and complicates reverse engineering efforts.
Unique random keys appended to each C2 message further mitigate the risk of behavioral signatures, ensuring operational security for malicious campaigns.
The initial infection beacon now registers each bot via a hardware identifier (HWID), with the server issuing individualized tasking and exfiltration targets per victim endpoint.
An integrated access token controls session integrity-even request errors are stringently handled with explicit opcodes and error codes, offering both resilience and fine-grained operator feedback.
Advanced Control Panel and Customization Features
On the attacker’s backend, the StealC V2 control panel has been overhauled. It now features a tightly integrated builder allowing real-time customization of payload rules, targeting, and botnet behavior.
Operators can fine-tune delivery logic by geolocation, HWID, installed software, or even specific data markers (e.g., credential files containing target strings like “coinbase.com”).

The unified file grabber collects data from a comprehensive set of applications, including browsers, email clients, instant messengers, VPNs, and crypto wallets, while multi-monitor screenshot functionality expands the scope of visual reconnaissance.
The builder and update mechanisms are tightly controlled via the StealC V2 support team, which distributes versioned binaries and RC4 keys through secure update packages.
This controlled distribution ensures all deployed instances remain compatible and obfuscated, reducing the likelihood of researcher tampering.
StealC V2 has already been observed in advanced multi-stage infection chains, often in conjunction with other malware loaders such as Amadey.
The ongoing development-highlighted by rapid feature rollouts like enhanced Firefox plugin loading and improved anti-detection techniques-signals a persistent and evolving threat.
Security vendors, including Zscaler, have responded with layered detection coverage, leveraging sandboxing and signature-based approaches under threat names such as Win64.PWS.Stealc.
Indicators of Compromise (IOCs)
Type | Value | Description |
---|---|---|
SHA256 (Packed, Themida) | 0b921636568ee3e1f8ce71ff9c931da5675089ba796b65a6b212440425d63c8c | StealC V2 sample |
SHA256 (Packed, Themida) | e205646761f59f23d5c8a8483f8a03a313d3b435b302d3a37061840b5cc084c3 | StealC V2 sample |
SHA256 (Unpacked) | a1b2aecdd1b37e0c7836f5c254398250363ea74013700d9a812c98269752f385 | StealC V2 sample |
SHA256 (Unpacked) | 27c77167584ce803317eab2eb5db5963e9dfa86450237195f5723185361510dc | StealC V2 sample |
SHA256 (Dropped Payload) | dd36c7d50cb05761391a7f65932193ec847d34f8ba1bb2f2a43ecf4985d911f4 | Amadey payload |
SHA256 (Malware dropping StealC V2) | 87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f | Amadey loader |
C2 Server | http://45.93.20[.]64/c090b39aa5004512.php | StealC V2 C2 |
C2 Server | http://45.93.20[.]28/3d15e67552d448ff.php | StealC V2 C2 |
C2 Server | http://88.214.48[.]93/ea2cb15d61cc476f.php | StealC V2 C2 |
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates