February 2025 Infostealer Trend Report

February 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on the distribution quantity, distribution methods, and disguise techniques of Infostealer collected and analyzed during February 2025. Below is a summary of the report.

 

1. Data Sources and Collection Methods

 

To proactively repond to Infostealer, AhnLab SEcurity intelligence Center (ASEC) operates various systems that automatically collect malware in distribution. The collected malware is analyzed for maliciousness and C2 information through an automated analysis system. Relevant information is provided in real-time through the ATIP IOC service and can also be found on the ATIP file analysis information page.

 

AhnLab System

  • Automatic collection system for malware disguised as cracks
  • Email honeypot system
  • Automatic analysis system for malware C2

 

ATIP Real-Time IOC Service

 

C2 and Malware Type Analysis Information

  • File Analysis Information – Related Information – Contacted URLs

 

The statistics in this report are intended to be used to check the overall distribution, disguising techniques, and distribution methods of Infostealer malware.
 

2. Infostealers Disguised as Cracks

 

This section provides statistics on Infostealer distributed under the guise of illegal programs such as cracks and keygens. The malware is distributed using a strategy called SEO-Poisoning, which ensures that malware distribution posts appear at the top of search engine results. ASEC has established a system to automatically collect and analyze such malware in real-time, blocking the malware’s C2 and providing related information to ATIP. Infostealers such as Vidar, Cryptbot, Redline, Raccoon, and StealC have been distributed in this manner, with LummaC2, Vidar, ACRStealer being the most commonly distributed recently.

 


Figure 1. Example of a malware distribution page

 

The following chart shows the quantity of malware distributed using this method over the past year. The second legend shows the quantity of samples collected by AhnLab before the relevant information was available on VirusTotal. It can be seen that most of the malware was collected and responded to through the automatic collection system. The distribution quantity began to increase significantly in the second quarter of this year, and has remained generally consistent since the fourth quarter of last year.

 


Chart 1. Quantity of Malware Distributed Annually

 

Threat actors are bypassing search engine filters by posting distribution articles on legitimate websites. They are using popular forums, Q&A pages of certain companies, free boards, and comments. The image below shows an example of distribution articles uploaded to various communities.

 


Figure 2. A post published on the legitimate website (Tidal)

 


Figure 3. A distribution post on the legitimate website (SlideShare)

Threat actors are mainly distributing malware through file hosting services. Users should be cautious of files downloaded from sites like Mega or Mediafire after multiple redirections. Since February, the threat actor has been using the Box cloud platform to distribute some of their malware.


Figure 4. Example of distribution using the Box cloud platform

 

Trend #1

 

The number of DLL-SideLoading types has decreased significantly, but the distribution rate of the form disguised as the DLL-SideLoading type has increased significantly. Multiple DLL and EXE files are compressed together for distribution, but the actual malware is a single EXE file. In this case, the DLL files are not related to the execution of the malware. It is presumed that a random DLL file was added to make it look more authentic to users. It is also possible that the threat actor intended to make it look like the DLL-SideLoading type for detection purposes.

 


Figure 5. Example of a meaningless DLL file

 

Trend #2

 

While most of the previously distributed cracked malware samples were LummaC2 Infostealers, multiple Vidar Infostealer samples were also distributed in February. Vidar was actively distributed in the same campaign in the past, but it was rarely distributed in 2024. However, meaningful amounts of Vidar have been distributed since February of this year.


Chart 2. Distribution of malware types in February

About 4% of malware distributed in February was Vidar, and a new execution type was identified among them. Unlike before, the malware is not distributed in an encrypted compressed file. Instead, it displays a GUI window that requires users to enter a password. After entering the password, users must click the Run button to start the malicious behavior, and the password is specified in the internal description file. Malicious behavior cannot be triggered in analysis environments such as sandboxes. This information has been covered in ASEC Notes.

 


Figure 6. Password input GUI window

 

For more information on statistics not covered in this summary, including the statistics on the disguised target companies and original file names used in malware development, distribution, the number of products that detected the malware, and Infostealer-related information from phishing emails, please refer to the full ATIP report.
 

MD5

0db4a9645adaa4fc99fb4605c30e62ce
153114eb60fde3e126fd45c49f083b3a
1e3cc411b33dc1191513bada2e240d87
23822c931f6e5738646b2def6e79f926
258456997a399f614dd773f1e2aee9c9
FQDN

www[.]zeniore[.]xyz