Friday, April 25, 2025
HomeBrowserTROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer, an information stealer that employs urgency to deceive victims.

This malware, first detected in December 2024, highlights an intricate attack chain designed to extract sensitive data from everyday consumers.

TROX Stealer’s success hinges on the psychological tactic of urgency, prompting victims to bypass critical thinking.

- Advertisement - Google News

Attackers leverage urgent-sounding emails with subjects like “Last Opportunity to Settle Debt Before Legal Action” or “Final Warning: Legal Action Pending for Your Account,” creating a sense of panic.

Malware as a Service (MaaS) platforms facilitate quick deployment and iteration of large-scale attack campaigns by attackers.

TROX Stealer was licensed on a weekly basis for a few days of exclusive use, demonstrating its rapid action capacity.

The Distribution Mechanism

Attackers targeted diverse sectors, including security companies, universities, and solar energy corporations, using TROX Stealer.

The emails contained HTML-generated text with a link to download supposed legal documents.

TROX Stealer
SQL queries and variable names used by the malware to target stored credit cards

This link redirected to a domain controlled by the attacker, where the malware, disguised as ‘DebtCollectionCase#######.exe’, was hosted.

The URL included a token ID, ensuring that the download only occurred once, preventing researchers from easily re-downloading the file for analysis.

Technical Sophistication

TROX Stealer’s installation process is characterized by several evasion techniques:

  • Initial Delivery: A Nuitka-compiled Python script, wrapped in multiple layers of obfuscation, is downloaded as a Windows executable from the attacker’s domain.
  • Execution: The downloaded file decompresses embedded files into a temporary folder, executing ‘client_pdf_case_388.pdf’, a decoy document, and ‘node700.exe’, a Node.JS interpreter, further executing scripts to maintain infection.
TROX Stealer
The decoy PDF file header that shows unique indicators
  • WebAssembly: The malware uses WebAssembly (Wasm) code encoded in Base64, employing extensive junk code to obscure its functionality and hinder analysis.

The infrastructure behind TROX Stealer includes various domains and IP addresses, with routine certificate management ensuring its persistence.

Accoeding to the Report, Sublime’s AI detection engine has been instrumental in preventing these attacks at the email delivery stage.

However, the sophistication of TROX Stealer, particularly its use of multiple programming languages and evasion techniques, highlights an evolving threat landscape.

Cybersecurity measures must adapt, integrating AI and advanced analytics to stay ahead of these complex threats. Awareness and vigilance remain essential in mitigating the risks posed by malware like TROX Stealer.

Indicators of Compromise (IOCs)

CategoryIdentifierValue
Domaindebt-collection-experts[.]com
Domaindocuments[.]debt-collection-experts[.]com
Domaindebt-collection-experts[.]online
Domaindownload.debt-collection-experts[.]online
Domaindownloads.debt-collection-experts[.]online
Domaindocs.debt-collection-experts[.]online
IP Address89.185.82.34 – Central to this campaign’s operations89.185.82.34
IP Address172.22.117.177 – Receives system profiles from malware172.22.117.177
File HashDebtCollectionCase#######.exe (SHA256)c404baad60fa3e6bb54a38ab2d736238ccaa06af877da6794e0e4387f8f5f0c6
File HashDebtCollectionCase#######.exe (SHA1)ae5166a8e17771d438d2d5e6496bee948fce80a4
File HashDebtCollectionCase#######.exe (MD5)c568b578da49cfcdb37d1e15a358b34a
File Hashnode700.exe (SHA256)12069e203234812b15803648160cc6ad1a56ec0e9cebaf12bad249f05dc782ef
File Hashnode700.exe (SHA1)29a13e190b6dd63e227a7e1561de8edbdeba034b
File Hashnode700.exe (MD5)f5f75c9d71a891cd48b1ae9c7cc9f80d
File HashTROX Stealer (SHA256)5d7ed7b8300c94e44488fb21302a348c7893bdaeef80d36b78b0e7f0f20135df
File HashTROX Stealer (SHA1)6deea67690f90455280bc7dfed3c69d262bf24f6
File HashTROX Stealer (MD5)fedb7287bcccc256a8dad8aeace799f7
Emailvpn@esystematics[.]de
Emailvpn@contactcorporate[.]de
Emailvpn@evirtual-provider[.]de

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

7 Best Third-Party Risk Management Software in 2025

Whether you operate a small business or run a large enterprise, you rely on...

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

7 Best Third-Party Risk Management Software in 2025

Whether you operate a small business or run a large enterprise, you rely on...

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser...

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive...