November 2025 Infostealer Trend Report

November 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on Infostealer malware collected and analyzed during the month of November 2025, including distribution volume, distribution channels, and disguising techniques. The following is a summary of the report.

 

1) Data Source and Collection Method

 

The AhnLab SEcurity intelligence Center (ASEC) operates various systems to automatically collect and distribute malware for proactive threat response. The collected malware is analyzed by an automated system to determine its maliciousness and C2 information. The relevant information is provided in real-time through the ATIP IOC service, and additional information can be found on the ATIP File Analysis Information page.

 

AhnLab’s internally built system

  • Crack and Patch Concealment Malware Automatic Collection System
  • Email Honeypot System
  • Malware C2 Automatic Analysis System

 

ATIP Real-time IOC service

 

C2 and Malware Type Analysis Information

  • File Analysis Information – Related Information – Contacted URLs

 

It is recommended to use the statistics in this report to gain an overall understanding of the distribution volume, disguise techniques, and trends of distribution of Infostealer malware. 2) Infostealer Distributed with Crack Disguise These statistics are about Infostealer malware being distributed disguised as illegal programs such as cracks and keygens. The malware is distributed using the strategy of making the distribution posts appear at the top of search engine results (SEO poisoning). ASEC has established a system that automatically collects malware distributed in this manner and analyzes their C2 information to block the C2 in real-time, as well as provide relevant information through ATIP. In November, ACRStealer, LummaC2, and Rhadamanthys Infostealer were the most distributed Infostealers.

 


Figure 1. Page distributing malware

 

Over the past year, the following chart shows the amount of malware distributed using this method. The second legend shows the amount of malware collected by AhnLab before the relevant information was available on VirusTotal. This shows that AhnLab first collected and responded to the majority of malware using the automatic collection system.

 


Chart 1. Quantity of Malware Distributed Annually

 

Previously, threat actors directly posted articles on blogs they created to distribute malware, but search engines began taking measures to prevent such malicious blogs from appearing in search results. To circumvent this, threat actors are now posting articles on legitimate websites to distribute malware. They are utilizing famous forums, Q&A pages of specific companies, free boards, comments, etc. The following image shows an example of posts for distributing malware uploaded to various communities. Posts uploaded in this manner appear at the top of search engine results and are visited by many users.

 


Figure 2. A distribution post on Facebook

 

As shown above, there are two types of execution methods for the Infostealer being distributed: one is distributed in EXE format, and the other uses the DLL Sideloading technique, which involves placing a legitimate EXE file and a malicious DLL file in the same folder so that when the legitimate EXE file is executed, the malicious DLL file is loaded.  In November, approximately 22.7% of the malware samples were distributed in EXE format, while the remaining 77.3% used the DLL Sideloading technique. The percentage of malware samples using the DLL Sideloading technique significantly increased compared to the previous month. This is due to the mass distribution of a new type of downloader malware that uses the DLL Sideloading technique.  DLL Sideloading malware is created by modifying only a portion of a legitimate DLL to include malicious code, so it closely resembles the original DLL. As a result, many security solutions may classify it as a legitimate file, making it crucial to remain cautious.

Trend #1

– Distributing a new type of Loader malware

Mass distribution of malware that connects to multiple fake C2s and downloads and executes malicious payloads from the C2.

 


Figure 3. Network behavior information

 

When the malware is executed, it performs numerous HTTP(s) connections, one of which involves downloading a JSON file from the actual C2. This file contains the malware’s configuration information.

 


Figure 4. Data downloaded from C2

 

In particular, when the value of [“cache”][“content”] is XOR-decrypted, a malware binary is generated and the module is loaded and executed.

 

Trend #2

– Distributing AURA Stealer

Since AURA Stealer was first identified in September, it has been distributed in small amounts, usually one or two times a month. However, a significant amount has been distributed since last month, so please be cautious. When executed, it injects into explorer.exe. It receives Base64-encoded configuration data from the C2, performs information theft behaviors according to this configuration, and then encodes the collected information in Base64 before transmitting it to the C2. The C2 URL format used in this process is as follows.

 

https://{C2}/api/live Check C2 Status
https://{C2}/api/conf Receiving Configuration File
https://{C2}/api/send Deodorization Information Sent

Table 1. AURA Stealer C2 URL format

 

The malware itself also holds configuration data, which includes the C2 domain, version information, build ID, and various configuration flags. There are three C2 domains, and the malware sequentially attempts to connect to them before successfully establishing a connection.

 


Figure 5. AURA Stealer configuration data

 

For more information on statistics not covered in this summary, statistics on the disguised target companies and original file names, distribution, and products, as well as information on Infostealers through phishing emails, please refer to the full ATIP report.

 

MD5

055e2fc77821cc4322a940b9ce0cc0b8
140816d53460fff723991818b9b9063d
1c8c7e541effb07a8199ffdfff960d9a
21acc271e9be7ebbbeb36a28a86c2d89
23a8782458baa3051d3a8ca8b3f54a4c