Today > | 1 Medium vulnerabilities   -   You can now download lists of IOCs here!

HEXON STEALER: THE LONG JOURNEY OF COPYING, HIDING, AND REBRANDING

Nov. 25, 2024, 11:27 a.m.

Description

Hexon Stealer, a malware capable of extracting sensitive information from browsers, has emerged as a rebranded version of Stealit Stealer. It utilizes the Electron framework and NSIS installer format to target browser cookies, credentials, and crypto-wallets. The malware grants full remote access to compromised systems, allowing attackers to monitor screens, control inputs, and engage in ransom negotiations. Hexon Stealer's key capabilities include Discord injection, game account access, cryptocurrency theft, and various remote control features. The developer, likely Turkish, promotes the stealer through Telegram and Signal channels, offering subscription plans. The malware's code is heavily obfuscated to evade detection, and it employs sophisticated techniques to exfiltrate stolen data.

Date

Published: Nov. 23, 2024, 2:03 p.m.

Created: Nov. 23, 2024, 2:03 p.m.

Modified: Nov. 25, 2024, 11:27 a.m.

Attack Patterns

Fewer Stealer

Stealit Stealer

Hexon Stealer

Hexon Stealer

T1574.002

T1018

T1547.001

T1012

T1497

T1005

T1573

T1082

T1057

T1071

T1047

T1055

T1036

T1003

T1059