HEXON STEALER: THE LONG JOURNEY OF COPYING, HIDING, AND REBRANDING
Nov. 25, 2024, 11:27 a.m.
Tags
External References
Description
Hexon Stealer, a malware capable of extracting sensitive information from browsers, has emerged as a rebranded version of Stealit Stealer. It utilizes the Electron framework and NSIS installer format to target browser cookies, credentials, and crypto-wallets. The malware grants full remote access to compromised systems, allowing attackers to monitor screens, control inputs, and engage in ransom negotiations. Hexon Stealer's key capabilities include Discord injection, game account access, cryptocurrency theft, and various remote control features. The developer, likely Turkish, promotes the stealer through Telegram and Signal channels, offering subscription plans. The malware's code is heavily obfuscated to evade detection, and it employs sophisticated techniques to exfiltrate stolen data.
Date
Published: Nov. 23, 2024, 2:03 p.m.
Created: Nov. 23, 2024, 2:03 p.m.
Modified: Nov. 25, 2024, 11:27 a.m.
Attack Patterns
Fewer Stealer
Stealit Stealer
Hexon Stealer
Hexon Stealer
T1574.002
T1018
T1547.001
T1012
T1497
T1005
T1573
T1082
T1057
T1071
T1047
T1055
T1036
T1003
T1059