
| Names | Stealc | |
| Category | Malware | |
| Type | Info stealer | |
| Description | (Cofense) Stealc is a relatively new malware family that was first seen in early 2023. It is known as a copycat information stealer because it has a suite of features that is ostensibly based on VIDAR, Raccoon, Mars, and RedLine stealers. By default, Stealc targets data in web browsers, browser extensions, cryptocurrency applications, and email messaging software. | |
| Information | <https://cofense.com/blog/luxury-hotels-remain-target-of-social-engineering-attack/> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.stealc> | |
Last change to this tool card: 13 October 2023
Download this tool card in JSON format
Previous: STASHLOG
Next: Stealer
| Changed | Name | Country | Observed | ||
APT groups | |||||
| ↳ Subgroup: Scattered Spider | [Unknown] | 2022-Aug 2025 | ![]() | ||
Other groups | |||||
| Scully Spider, TA547 | [Unknown] | 2017-Mar 2024 | |||
2 groups listed (1 APT, 1 other, 0 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||