Cryptocurrency

LeakyInjector And LeakyStealer Malware Steal Crypto, Browsing Data

A new two-stage malware family has emerged, targeting cryptocurrency enthusiasts and everyday users alike.

Dubbed LeakyInjector and LeakyStealer by researchers at Hybrid Analysis, this duo stealthily infiltrates Windows systems to siphon sensitive data, including crypto wallet credentials and browser histories.

First spotted in early October 2025, the malware masquerades as legitimate software, leveraging a valid Extended Validation (EV) certificate to evade initial scrutiny.

Signed by Hefei Nudan Jukuang Network Technology Co., Ltd., and issued by Sectigo, the certificate valid until September 2026 has been linked to at least seven related samples, suggesting reuse by a persistent threat actor.

Initial Infection and Evasion Tactics

LeakyInjector serves as the dropper, a padded 64-bit executable around 30 MB that scans for the explorer.exe process on the infected machine.

It employs low-level Windows APIs for process injection, decrypting the second-stage payload LeakyStealer using the ChaCha20 algorithm with hardcoded keys and nonces.

Once injected, LeakyStealer establishes persistence by copying itself to the %AppData% directory as “MicrosoftEdgeUpdateCore.exe” and adding a “EdgeUpdateCore” entry to the Run registry key.

This mimics Microsoft Edge updates, blending seamlessly with system processes. To dodge detection, LeakyStealer features a rudimentary polymorphic engine.

It scans its memory for a hardcoded 8-byte marker (“DE AD BE EF CA FE BA BE”) and patches the surrounding 16 bytes with NOP instructions or harmless jumps, altering its footprint at runtime.

Debug strings and minimal obfuscation reveal a sample likely in active development, yet its beaconing to a command-and-control (C2) server at regular intervals using HTTP POST requests to 45.151.62.120:443 ensures reliable exfiltration.

The server, tied to domains like everstead.group and ip-ptr.tech, responds with commands parsed via WinHTTP functions.

Data Theft and Backdoor Capabilities

LeakyStealer computes a unique Bot ID by XORing the C: drive’s volume serial with 0xDEADBEEF, then gathers system intel like hostname, username, domain, and Windows version using APIs such as RtlGetVersion and GetTokenInformation.

It checks for admin privileges before exfiltrating this data in a “LOAD” packet to /api/beacon.

File Summary

The real prize lies in its theft mechanisms. The malware hunts for crypto wallets including Electrum, Exodus, Atomic, Sparrow, Ledger Live, Guarda, and BitPay, plus browser extensions like MetaMask, Phantom, Coinbase, and Trust Wallet.

It also plunders history files from Chrome, Edge, Brave, Opera, and Vivaldi, copying them to temp folders as “history_%d.db,” reading contents in memory, and deleting traces with DeleteFileA.

Exfiltrated via /api/beacon/history with an X-Bot-Id header, this data fuels potential phishing or account takeovers.

Two backdoor commands amplify its danger: one downloads and executes remote files using CreateProcessA, while the other runs Windows commands via anonymous pipes, relaying output to the C2.

Distribution traces back to an MSI installer on paycnex.com, alongside a PowerShell script linked to NetSupport RAT, hinting at broader campaigns.

Hybrid Analysis’s deep dive underscores the malware’s sophistication despite its flaws.

As crypto adoption grows, users must prioritize endpoint detection, certificate validation, and browser isolation.

Revoked post-analysis, the signing cert highlights the risks of abused legitimate infrastructure a wake-up call for heightened vigilance in 2025’s threat environment.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Share
Published by
Varshini
Tags: malware

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago