Skip to main content

June 2025 Infostealer Trend Report

Medium
Published: Wed Jul 16 2025 (07/16/2025, 16:10:15 UTC)
Source: AlienVault OTX General

Description

This analysis provides insights into Infostealer malware trends observed in June 2025. The data, collected through various automated systems, reveals changes in distribution methods and malware types. While LummaC2 has been dominant, June saw increased activity from Rhadamanthys, ACRStealer, Vidar, and StealC. A new variant of ACRStealer emerged, using advanced techniques like HTTP host domain spoofing and anti-analysis methods. Distribution via crack disguises decreased, with 94.4% in EXE format and 5.6% using DLL-SideLoading. A unique malware type was observed, creating an uncontrollable window prompting browser updates. Some samples now hide compression passwords in image files, indicating evolving evasion tactics.

AI-Powered Analysis

AILast updated: 07/16/2025, 20:17:08 UTC

Technical Analysis

The June 2025 Infostealer Trend Report highlights evolving trends in the deployment and sophistication of infostealer malware families. Infostealers are malicious programs designed to covertly extract sensitive information such as credentials, cookies, autofill data, and system details from infected hosts. The report identifies several prominent malware strains active in June 2025, including LummaC2, Rhadamanthys, ACRStealer, Vidar, and StealC. Notably, a new variant of ACRStealer has emerged, employing advanced evasion techniques such as HTTP host domain spoofing to masquerade network communications and anti-analysis methods to hinder detection and reverse engineering efforts. The distribution methods have shifted away from crack-based disguises, with 94.4% of samples delivered as standalone executable (EXE) files and 5.6% leveraging DLL side-loading, a technique where malicious DLLs are loaded by legitimate applications to evade detection. A unique malware behavior was observed where an uncontrollable window prompts users to update their browsers, likely a social engineering tactic to induce user interaction or distract from malicious activity. Additionally, some malware samples now embed compression passwords within image files, an innovative evasion tactic to bypass static and heuristic detection by hiding payload decryption keys in innocuous-looking files. The malware families utilize a range of MITRE ATT&CK techniques, including credential dumping (T1555), process injection (T1055), discovery (T1082, T1087), command execution (T1059), and persistence mechanisms (T1547.001). Although no known exploits in the wild are reported, the evolving sophistication and distribution methods indicate a persistent threat landscape. The report underscores the importance of monitoring these malware families and adapting detection and mitigation strategies accordingly.

Potential Impact

For European organizations, the proliferation of these infostealer malware strains poses significant risks to confidentiality and integrity of sensitive data, including employee credentials, financial information, and intellectual property. The use of advanced evasion techniques complicates detection, increasing the likelihood of prolonged undetected breaches. Credential theft can lead to lateral movement within networks, enabling attackers to escalate privileges and access critical systems. The DLL side-loading technique and executable-based distribution increase the attack surface, potentially impacting a wide range of endpoints. The social engineering tactic of prompting browser updates may lead to user interaction that facilitates further compromise. Given Europe's stringent data protection regulations such as GDPR, breaches involving personal data can result in severe legal and financial penalties. Additionally, the theft of corporate secrets or disruption caused by malware can affect business continuity and reputation. The medium severity rating reflects the moderate ease of exploitation combined with potentially high impact on confidentiality and operational integrity if infections are successful.

Mitigation Recommendations

European organizations should implement multi-layered defenses tailored to the evolving tactics observed in this campaign. Specific recommendations include: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL side-loading and process injection behaviors. 2) Monitor network traffic for anomalies such as HTTP host domain spoofing and unusual outbound connections to known C2 infrastructure associated with these malware families. 3) Implement strict application whitelisting to prevent execution of unauthorized EXE files and DLLs. 4) Conduct regular user awareness training focused on recognizing social engineering tactics, including fake browser update prompts. 5) Utilize threat intelligence feeds to update detection signatures with the provided malware hashes and indicators of compromise. 6) Enforce least privilege principles and multi-factor authentication to limit the impact of credential theft. 7) Scan and analyze image files and compressed archives for hidden payloads or embedded passwords using specialized forensic tools. 8) Maintain up-to-date patching of operating systems and applications to reduce exploitation vectors. 9) Employ behavioral analytics to detect suspicious process and file activities indicative of infostealer operations. 10) Establish incident response plans that include rapid containment and forensic analysis upon detection of these malware families.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/89033"]
Adversary
null
Pulse Id
6877cee76da84ce9db22b91e
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0b6eafed70b9b9f2ad5f8ef3047e0f91
hash6ad298a767eee3b460bc9374bae33b99d6e7ecdc
hash9868233efd40db7ca4ca8a74ba02b87ff7af25cc812a4656ffd36c50d4f9e919
hash01542f203172d51d65bb37ce2cc2d813
hash0896888ab8c9278da66138d2a0c5e713
hash08a441a738a7a323abb97c576f619a22
hash09825dd40ba8ba3c1ce240e844d650a8
hash1d93a4ffc74db9be889ca2b9c66a9c4e31e80b12
hash4799f47fac919b33ad235bddae6dd53bafac728f
hashc112707dc426200f5baea78d00137783a5dc3199
hash1433f0f5590a42050ca6981ddac6a10fd407b212dae565454bcd083b9f19f1cc
hasha8f62dcf23a98fef9e2a58ab5d4354fa202be0acaa0a3e00942e89d49403a9af
hashd26eb35cee1df8774294ce519950fd7fe9b1122d23a6afd0626476c7453417fc

Threat ID: 68780518a83201eaacde1699

Added to database: 7/16/2025, 8:01:28 PM

Last enriched: 7/16/2025, 8:17:08 PM

Last updated: 7/17/2025, 12:38:45 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats