This analysis details a multi-stage Windows attack that begins with a fake Cloudflare CAPTCHA (ClickFix) social-engineering prompt to trick victims into executing malicious PowerShell, which in-memory loads shellcode, a PE downloader, and ultimately the StealC information stealer. The StealC payload harvests browser credentials, crypto wallets, Steam and Outlook data, system fingerprints, and screenshots exfiltrating data to RC4-encrypted HTTP C2 servers. #StealC #ClickFix
Keypoints
- Initial vector is a ClickFix/fake CAPTCHA social-engineering trick delivered via a compromised site (madamelam.com) and malicious JavaScript that instructs users to paste and run PowerShell commands.
- Execution is fileless and multi-stage: PowerShell loader â Donut position-independent shellcode (cptch.bin) â reflectively loaded 64-bit PE downloader â StealC stealer (cptchbuild.bin).
- StealC is a builder-based (MaaS) 64-bit MSVC-compiled information stealer that supports modular theft of browser credentials, crypto wallets, Steam accounts, Outlook credentials, system data, screenshots, and file grabbing.
- C2 communications use HTTP with Base64+RC4 encryption (Build ID as RC4 key), chunked JSON uploads (256 KB chunks), and distinctive network artifacts (User-Agent âLoaderâ).
- Evasion techniques include fileless memory execution, reflective PE loading, API hashing, string obfuscation (RC4+Base64), process injection/hollowing into svchost.exe, and no persistence with optional self-delete.
- Defensive recommendations emphasize monitoring PowerShell usage, detecting VirtualAlloc/CreateThread patterns, flagging suspicious User-Agent strings and large Base64-encoded POSTs, and training users against fake verification prompts.
MITRE Techniques
- [T1059.001 ] PowerShell â Used as the initial execution mechanism to retrieve and run the in-memory loader script (âPress Windows Key + R to open the Run dialog ⌠Press Ctrl + V to paste a pre-loaded commandâ).
- [T1204 ] User Execution â Social-engineering via a fake CAPTCHA prompts victims to execute commands, exploiting user trust (âThe fake CAPTCHA page mimics a legitimate Cloudflare security check, then instructs victims to: Press Windows Key + R ⌠Press Ctrl + Vâ).
- [T1620 ] Reflective Code Loading â The Donut-generated position-independent shellcode reflectively loads embedded PE payloads entirely in memory (âposition-independent shellcode ⌠Donut embeds the entire PE file within the shellcode payloadâ).
- [T1055 ] Process Injection â The 64-bit downloader injects the StealC payload into svchost.exe by allocating memory in the target process, writing the payload, and creating a remote thread (âallocates memory in the target process, writes the StealC payload to allocated memory, creates a remote threadâ).
- [T1027 ] Obfuscated Files or Information â String obfuscation and dual-layer encryption (RC4 + Base64) hide configuration, C2 URLs, and module names (âPlaintext string â RC4 encryption (hardcoded key: rOIBXiPtf9) â Encrypted bytes â Base64 encodingâ).
- [T1555.003 ] Credentials from Web Browsers â StealC extracts and decrypts credentials from Chromium-based browsers by retrieving the encrypted key and using DPAPI/AES-GCM to decrypt stored passwords (âreads the Local State file ⌠calls CryptUnprotectData ⌠uses the decrypted key with AES-GCM to decrypt the stored passwordsâ).
- [T1552.002 ] Credentials from Registry â StealC extracts Outlook credentials stored in Windows Registry and decrypts them using DPAPI (âextracts the encrypted password from the registry ⌠calls CryptUnprotectData to decrypt the passwordâ).
- [T1041 ] Exfiltration Over C2 Channel â Stolen data is packaged into Base64-encoded JSON and uploaded to C2 servers over HTTP with RC4 encryption (âformats stolen data into structured JSON payloads ⌠applies a multi-layer encryption scheme ⌠transmits to the C2 serverâ).
- [T1113 ] Screen Capture â The malware captures screenshots via GDI+ (BitBlt/GDI+ JPEG compression) and uploads them to C2 (âthe module named `take_screenshot` takes a screenshot ⌠converts the captured bitmap to JPEG format ⌠uploads the screenshot file to the C2 serverâ).
- [T1082 ] System Information Discovery â StealC collects detailed system fingerprints (OS version, HWID, CPU, RAM, GPU, locale) for victim profiling (âgenerates a comprehensive system fingerprint ⌠includes OS details, hardware, timestamps, system languageâ).
- [T1057 ] Process Discovery â The stealer enumerates running processes to aid targeting and injection decisions (âThe malware lists all running processesâ).
- [T1012 ] Query Registry â Registry enumeration is used to locate Steam paths and Outlook profiles and to extract stored credentials (âlocates Steam installations by querying the registry key HKCUSoftwareValveSteamSteamPathâ; âqueries specific Windows Registry locations including HKCUSoftwareMicrosoftOfficeOutlookProfilesâ).
- [T1548 ] Abuse Elevation Control Mechanism â StealC can request UAC elevation and attempts privilege escalation (SeDebugPrivilege) when needed to access protected locations (âThe module ⌠attempts SeDebugPrivilege string used for privilege escalationâ and âStealC can request UAC elevationâ).
Indicators of Compromise
- [IP Addresses ] C2 and payload servers â 94.154.35.115 (Stage 2 payload delivery), 91.92.240.219 (PowerShell loader), and 2 other infrastructure IPs (178.16.53.70, 91.92.240.190).
- [URLs / Domains ] Malicious scripts and fake CAPTCHA hosts â hxxps://goveanrs.org/jsrepo (malicious JS), https://cptoptious.com (fake CAPTCHA), and compromised site madamelam.com used to deliver the initial script.
- [File Names ] Stage payloads and artifacts â cptch.bin (Donut shellcode), cptchbuild.bin (StealC payload), plus temporary artifact screenshot.jpg created before exfiltration.
- [File Hashes ] Known payload hashes â cptch.bin SHA-256: 5ad34f3a900ec243355dea4ac0cd668ef69f95abc4a18f5fc67af2599d1893bd; cptchbuild.bin SHA-256: dc38f3f3c8d495da8c3b0aca8997498e9e4d19738e1e2a425af635d37d0e06b8.
- [HTTP Headers ] Malicious User-Agent â âLoaderâ used by the downloader when requesting cptchbuild.bin (indicative of the downloader component).
- [Registry Keys / Paths ] Targets for credential and wallet harvesting â HKCUSoftwareValveSteamSteamPath (Steam discovery), %LOCALAPPDATA%GoogleChromeUser Data (Chromium extension and wallet storage paths), and HKCUSoftwareMicrosoftOfficeOutlookProfiles (Outlook credentials).