Headline
Experts Detail Saintstealer and Prynt Stealer Info-Stealing Malware Families
Cybersecurity researchers have dissected the inner workings of an information-stealing malware called Saintstealer that’s designed to siphon credentials and system information. “After execution, the stealer extracts username, passwords, credit card details, etc.,” Cyble researchers said in an analysis last week. "The stealer also steals data from various locations across the system and
Cybersecurity researchers have dissected the inner workings of an information-stealing malware called Saintstealer that’s designed to siphon credentials and system information.
“After execution, the stealer extracts username, passwords, credit card details, etc.,” Cyble researchers said in an analysis last week. “The stealer also steals data from various locations across the system and compresses it in a password-protected ZIP file.”
A 32-bit C# .NET-based executable with the name “saintgang.exe,” Saintstealer is equipped with anti-analysis checks, opting to terminate itself if it’s running either in a sandboxed or virtual environment.
The malware can capture a wide range of information that ranges from taking screenshots to gathering passwords, cookies, and autofill data stored in Chromium-based browsers such as Google Chrome, Opera, Edge, Brave, Vivaldi, and Yandex, among others.
It can also steal Discord multi-factor authentication tokens, files with .txt, .doc, and .docx extensions as well as extract information from VimeWorld, Telegram, and VPN apps like NordVPN, OpenVPN, and ProtonVPN.
Besides transmitting the compressed information to a Telegram channel, the metadata related to the exfiltrated data is sent to a remote command-and-control (C2) server.
What’s more, the IP address linked to the C2 domain — 141.8.197[.]42 — is tied to multiple stealer families such as Nixscare stealer, BloodyStealer, QuasarRAT, Predator stealer, and EchelonStealer.
“Information stealers can be harmful to individuals as well as large organizations,” the researchers said. “If even unsophisticated stealers like Saintstealer gain infrastructural access, it could have devastating effects on the cyberinfrastructure of the targeted organization.”
The disclosure comes as a new infostealer named Prynt Stealer has surfaced in the wild that can also perform keylogging operations and financial theft using a clipper module.
“It can target 30+ Chromium-based browsers, 5+ Firefox-based browsers, and a range of VPN, FTP, messaging, and gaming apps,” Cyble noted last month.
Sold for $100 for a one-month license and $900 for a lifetime subscription, the malware joins a long list of other recently advertised stealers, including Jester, BlackGuard, Mars Stealer, META, FFDroider, and Lightning Stealer.
Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.