This rebranded malware digs deep into your data leveraging Telegram API for data exfiltration


Cyber threats continue to evolve and one of the latest emerging threats identified by CYFIRMA research team is the Angry Stealer malware.
This info-stealer has been discovered to be actively advertised across various online platforms, including Telegram, which broadens its reach making it available to a wide audience of potential attackers.
Angry Stealer is a sophisticated malware that targets a wide range of sensitive information using advanced techniques and rebranding tactics. It is based on the previously identified Rage Stealer, sharing almost identical code, behavior, and functionality.
Stepasha.exe and MotherRussia.exe payloads raid any system
Angry Stealer is deployed through a dropper binary, a 32-bit Win32 executable written in .NET, designed to execute two main payloads: “Stepasha.exe” and “MotherRussia.exe.” The primary payload, Stepasha.exe, functions as the core of the Angry Stealer operation, focusing on stealing sensitive information. This includes browser data (passwords, cookies, and autofill information), cryptocurrency wallet details, system information, VPN credentials, Discord tokens, and more. The data is then exfiltrated to a remote server via Telegram, using hardcoded credentials and bypassing SSL validation to ensure successful data transmission.
The secondary payload, MotherRussia.exe, serves as a tool for creating further malicious executables. This builder tool allows attackers to generate custom malware, potentially facilitating remote desktop access or additional bot interactions. The dual-payload approach not only broadens the scope of data theft but also enables the creation of bespoke malicious software tailored to specific targets or attack scenarios.
Upon execution, Angry Stealer infiltrates a victim’s computer and begins a systematic collection of sensitive data. It specifically targets popular web browsers using a multi-threaded approach, allowing it to gather data from multiple browsers simultaneously, extracting passwords, credit card details, cookies, autofill data, bookmarks, running processes, screen captures, and system specifications. The malware organizes this stolen data into a designated directory located at C:\Users\Username\AppData\Local\44_23, where it creates subdirectories for different types of information.
Once the browser paths have been scanned to collect valuable information, the malware imposes size limits on the files it copies to avoid detection. Additionally, Angry Stealer is capable of accessing user files from key directories such as Desktop and Documents, focusing on documents and personal data that may be of interest to attackers.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Furthermore, it can determine the system’s IP address, geographical location, and network-related data – providing attackers with comprehensive information about the victim’s environment. This data collection capability allows attackers to tailor their subsequent actions based on the specific characteristics of the infected system.
To effectively combat the threat posed by Angry Stealer and similar malware, organizations should implement a multi-layered security approach. Key strategies include deploying robust endpoint security solutions capable of detecting and blocking malicious activities associated with info stealers, and ensuring that operating systems, applications, and security software are regularly updated to patch vulnerabilities that could be exploited.
Additionally, implementing network segmentation can help limit the movement of malware within the network, reducing the risk of widespread data theft. Organizations should also conduct comprehensive employee training programs to raise awareness about phishing threats and safe online practices. Finally, having an up-to-date incident response plan is crucial for quickly addressing potential malware infections, minimizing damage, and facilitating the recovery of affected systems.
More from TechRadar Pro
Cyber threats continue to evolve and one of the latest emerging threats identified by CYFIRMA research team is the Angry Stealer malware. This info-stealer has been discovered to be actively advertised across various online platforms, including Telegram, which broadens its reach making it available to a wide audience of potential…
Recent Posts
- Nvidia confirms ‘rare’ RTX 5090 and 5070 Ti manufacturing issue
- I used NoteBookLM to help with productivity – here’s 5 top tips to get the most from Google’s AI audio tool
- Reddit is experiencing outages again
- OpenAI confirms 400 million weekly ChatGPT users – here’s 5 great ways to use the world’s most popular AI chatbot
- Elon Musk’s AI said he and Trump deserve the death penalty
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010