Self Assessment

FLESH STEALER : UNMASKING THE BLUE MASKED THIEF

Published On : 2025-02-04
Share :
FLESH STEALER : UNMASKING THE BLUE MASKED THIEF

Executive Summary

At CYFIRMA, we are dedicated to providing timely insights into emerging threats and tactics used by cybercriminals targeting individuals and organizations. This report examines Flesh Stealer, a .NET executable written in C#. The malware does not target CIS countries and is capable of bypassing app-bound encryption employed by Chrome. Developed by a Russian-speaking individual, Flesh Stealer includes various features such as anti-debugging and anti-VM capabilities.

Introduction

Flesh Stealer has been actively promoted on Discord and Telegram channels, as well as lesser-known underground forums like Pyrex Guru. Employing Base64 obfuscation techniques to conceal its functions and strings, the stealer first emerged in August 2024 and continues to receive updates with new features.

Promoting Stealer on Underground Forum

Promotional efforts for Flesh Stealer extended to YouTube, where its developer shared a walkthrough of the malware (however the video was eventually taken down by the platform). A dedicated website that was used to distribute the stealer was also removed, with its last recorded activity occurring in October 2024.

Flesh Stealer is designed to target browsers such as Opera, Chrome, Firefox, and Edge, from which it steals cookies, credentials, and browsing history. Additionally, it also steals data from applications like Signal and Telegram, extracting stored databases and chats, which are then transferred to the attacker’s command and control infrastructure.

Assessment

The malware checks for the presence of a specific cultural setting, referred to as CIS countries (Commonwealth of Independent States) by evaluating the installed input languages on the system. If any of the installed languages match, the malware will refrain from executing or infecting the system.

Check for CIS Countries

Flesh stealer employs anti-VM techniques to detect if it’s running in a virtualized environment. It checks physical memory characteristics, system speed, and BIOS version as indicators of a virtual machine. Additionally, the malware scans for specific strings such as, BOCHS, VMware, VirtualBox, Hyper-V, Qemu, to identify virtual environments. If any of these conditions are met, the malware will kill its activity to avoid detection and analysis.

Anti VM Techniques

Flesh stealer has anti debugging technique it scans for debugging tools – such as Wireshark and HttpDebuggerUI – by retrieving a list of all active processes on the system. It then compares the running processes against a predefined list of debugger names. If a match is detected, the malware attempts to kill the debugger process.

Anti Debugger Techniques

This below code is to extract sensitive information such as saved passwords, cookies, and from popular browsers like Chrome, Firefox, Brave and Edge, checking for the presence of these browsers on the victim’s system. As highlighted in the video title of flesh stealer, it can additionally work on Chrome 129, and is capable of bypassing Chrome’s App Bound Encryption to access protected data.

Checking Browsers on Target System

The code leverages the Windows Management Instrumentation (WMI) component to gather details about Plug and Play (PnP) devices attached to the victim’s system, retrieving specific properties of these devices, such as name, description, status, and PNPClass. The code then saves all these details to a file named device.txt.

Checking for PnP Devices List

Flesh stealer also extracts Wi-Fi network credentials from the victim’s system using the ‘netsh’ command-line tool to retrieve detailed information about a specific Wi-Fi profile. The extracted information contains authentication type and encryption algorithm and password.

Extracting Wi-Fi Credentials

Introductory Phase

In August 2024, the Flesh Stealer developer created a domain to promote the malware, offering a free version of the stealer. However, the website is now offline.

Flesh Stealer domain and Website HTML Content

Control Panel and Recent Development

On January 29, 2025, the developer announced that Flesh Stealer now supports version 131 of Chrome.

Flesh Stealer Recent Developments

The user of Flesh Stealer obliges the control panel to customize their stealer with various functions, such as enabling anti-debug features, adding the stealer to startup, or running it with administrator privileges. All victim logs are sent to the attacker’s hosted infrastructure and can be viewed in the logs section of the panel.

Stealer Control Panel

External Threat Landscape Management

The developer of Flesh Stealer is a Russian speaker and employs the common tactic of avoiding attacks on CIS countries, a strategy often used by Russian or CIS-based developers to avoid being banned from Russian-based forums. The developer is active on two or three forums, including PyrexGuru, Dzen.

The Flesh Stealer channel has been active since August 17, 2024, and has over 210 users. There are three channels: one for Russian speakers, one for English speakers, and another one for Product feedback, the latter created on October 31, 2024, which currently has over 10 users.

Telegram Channel Details of Flesh Stealer

Diamond Model

List of IOCs

Indicators Remarks
d96e63fb18eb2e587f33e100501f66cc83225b8f19a374ad5817bc7c1ec07896 Analysed Version
b388d2b53453add11982a0e5b86ee01bbaf318ee77483300731d2202ce906146 Free Version
Utka[.]xyz Old Domain of Flesh Stealer

MITRE TTPs

Tactics Technique Object
Execution T1047: Windows Management Instrumentation
T1129: Shared Modules 
Access WMI data in .NET
Link function at runtime on Windows
Defense Evasion T1140: Deobfuscate/Decode Files or Information 
T1112: Modify Registry
T1027: Obfuscated Files or Information
T1497.001: Virtualization/Sandbox Evasion: System Checks
Decode data using Base64 in .NET
Delete registry keys
Encrypt data using DPAPI
Anti-VM strings targeting Xen
Discovery T1082: System Information Discovery
T1057: Process Discovery
T1033: System Owner/User Discovery 
T1087: Account Discovery 
T1083: File and Directory Discovery 
T1012: Query Registry
T1518: Software Discovery
T1016: System Network Configuration Discovery
Get OS Version, Disk Information, Hostname, Number of Processors.
Find process by name or PID
Checks if a File or directory exists.
Gather Networking Interfaces details.
Collection T1113: Screen Capture Capture Screenshots
Command and Control T1105: Ingress Tool Transfer  Download and Write a File

Conclusion

New stealers are emerging daily on platforms like Telegram, and, despite Telegram’s new transparency policies, malware developers continue to use these platforms to promote their stealer and host their command-and-control (C2) servers – through bots or webhooks – to control targets or collect their data. Flesh Stealer has received positive feedback from its users, motivating the developer to regularly update it with new features.

Recommendations

Strategic Recommendations:

Threat Intelligence Integration: Continuously monitor and incorporate threat intelligence feeds into your organization’s cybersecurity framework to stay updated on emerging threats like Flesh Stealer.

Incident Response Planning: Develop and maintain a robust incident response plan that includes handling sophisticated malware attacks targeting sensitive data and credentials.

Collaboration with Industry Groups: Partner with cybersecurity communities, CERTs, and government agencies to share intelligence and best practices for mitigating threats posed by advanced stealers.

Management Recommendations:

Employee Awareness and Training: Conduct regular awareness programs to educate employees about phishing tactics, malware risks, and the importance of safe browsing habits.

Access Management: Implement strict access controls, applying the principle of least privilege (PoLP) to limit exposure to critical systems and sensitive data.

Vendor and Third-Party Risk Assessment: Evaluate third-party software, plugins, and extensions for potential vulnerabilities that could be exploited by malware like Flesh Stealer.

Backup Policy Enforcement: Ensure regular and secure backups of critical data to enable recovery in case of data exfiltration or ransomware attacks.

Technical Recommendations:

Endpoint Protection and Monitoring: Deploy advanced endpoint detection and response (EDR) tools to monitor, detect, and mitigate malware activities such as process injection and registry modifications.

Browser and Extension Hardening: Disable unnecessary browser extensions, enforce the use of vetted plugins, and restrict downloads from untrusted sources.

Behavioral Analytics: Leverage machine learning-based tools to detect anomalous behavior, such as unauthorized data access or system modifications, indicative of malware activities.

Anti-Phishing Mechanisms: Employ email filters, sandboxing, and DNS filtering to block phishing attempts that distribute malware like Flesh Stealer.

Credential Hygiene: Enforce multi-factor authentication (MFA) and encourage users to avoid reusing passwords across platforms.