Cybersecurity researchers have issued fresh warnings following the discovery of significant upgrades to the Katz Stealer, a rapidly evolving information-stealing malware that has gained prominence among cybercriminal groups throughout 2025.
According to in-depth analyses, Katz Stealer now leverages a sophisticated combination of stealthy persistence mechanisms, advanced system fingerprinting, and modular payload delivery all features that make it particularly dangerous for both home users and enterprises alike.
The malware, distributed as part of a Malware-as-a-Service (MaaS) model, is capable of exfiltrating a wide range of sensitive data.
This includes credentials from Chromium and Firefox browsers, cryptocurrency wallet details from desktop applications and browser extensions, session tokens from messaging platforms such as Discord and Telegram, email credentials from popular clients, VPN/Wi-Fi credentials, clipboard contents, screen captures, and even game account data from platforms like Steam.
This breadth of data theft is supported by an evasion-oriented approach, with payloads delivered through phishing campaigns and disguised as legitimate software.
Enhanced Infection Chain and Persistence
The infection process for Katz Stealer has been designed for maximum stealth. It commonly begins with a malicious GZIP archive, delivered via phishing emails or fake software downloads, which contains a heavily obfuscated JavaScript dropper.
This script avoids detection by using techniques such as type coercion, misuse of exceptional values (e.g., Infinity), and dynamic string reconstruction utilizing array manipulation and implicit type casting.
Security experts note that these methods pose a challenge for static analysis and hinder reverse engineering, as each component is fragmented and encoded in non-linear, self-mutating expressions.
Once activated, the JavaScript dropper leverages Windows’ built-in PowerShell to execute a base64-encoded payload entirely in memory, preventing detection by traditional file-based antivirus solutions.
The second-stage payload is typically concealed within an image file, utilizing steganography to evade further security checks.
The malware then proceeds to bypass User Account Control (UAC) using the legitimate cmstp.exe utility and installs a scheduled task to ensure persistence, even after system reboots.
After obtaining elevated privileges, Katz Stealer injects its primary payload into a legitimate process, often MSBuild.exe, via process hollowing. This tactic allows the malware to masquerade as a trusted executable.
This injection into a Microsoft-signed binary provides cover from many endpoint detection and response (EDR) solutions, greatly enhancing the malware’s stealth.
Evasion, Data Theft, and Command-and-Control
The malware performs extensive system fingerprinting, including locale, keyboard layout, and BIOS checks, to identify and avoid running in analysis environments such as sandboxes or virtual machines, where defenses may be deployed.
This geofencing and sandbox detection, including checks for VM-specific strings, low screen resolutions, and short uptime, ensures that Katz Stealer only operates on real-world targets, minimizing the risk of detection by researchers.
Once established, Katz Stealer maintains a persistent connection to its command-and-control (C2) server and deploys additional modules from the cloud for data theft.
The malware is notable for injecting itself into browser processes, including those based on Chromium and Firefox, where it can access and exfiltrate credentials, session cookies, and even encrypted wallet data.
Stealthy exfiltration is performed in memory, typically using HTTP/HTTPS requests with user-agent strings designed to mimic legitimate browser traffic but including a telltale “katz-ontop” tag a distinct indicator that defenders can use to identify malicious activity.
With robust persistence, advanced evasion, and comprehensive credential theft capabilities, Katz Stealer stands as a clear and present threat to both consumers and organizations in 2025.
Security teams are urged to monitor for associated indicators of compromise, including unique user-agent strings, suspicious network traffic to known C2 domains, and artifacts such as temporary DLLs in user folders, to detect and mitigate Katz Stealer infections before sensitive data is lost.
Indicators of Compromise (IOCs) for the Katz Stealer Malware
Security teams should monitor for the following IOCs associated with Katz Stealer activity, as compiled from 2025 reports.
C2 Servers (IP addresses & Domains)
- 185.107.74[.]40 (primary TCP C2)
- 31.177.109[.]39 (additional IP seen in some configs)
- twist2katz[.]com (Discord injection remote code host)
- pub-ce02802067934e0eb072f69bf6427bf6[.]r2[.]dev (Cloudflare R2 domain hosting second-stage payloads)





