ACCE Release Notes v2.9.20250618

This release consists of the following:

SvcStealer Research

Optimal Dropper

While adding support for SvcStealer, we identified that the sample in a post from threat researcher Jane_0sint was a dropper containing SvcStealer and additional payloads. Optimal Dropper, named for the InternalName found in the file metadata of some samples, contains multiple plaintext payloads which are dropped to disk and executed. Payloads included: SvcStealer, Diamotrix Clipper, modified versions of KINS Dropper and TinyNuke, RedLine Stealer, Amadey Stealer, DcRat implant, Lumma Stealer, QuasarRAT stealer, Kitsune RAT, VenomRAT, Violet Stealer, newly observed malware we are calling MuddyRust Installer and Fevur Loader, and numerous hack tools.

MuddyRust

MuddyRust is a Rust compiled installer which we named based upon a class “muddy_internal” observed in non-stripped samples. MuddyRust contains an XOR encoded component, decoded using a 32-byte key, and decrypts strings using the ChaCha20-Poly1305 algorithm. In some samples, the ChaCha20 key was XOR encoded.

MuddyRust establishes persistence using a scheduled task and checks the compromised system for analysis tools including dnspy.exe, immunitydebugger.exe, pe-sieve32.exe, etc.

Fevur Loader

Fevur Loader contains an RC4-encrypted component which is injected into a newly created, suspended process instance of the module file. APIs in Fevur Loader are dynamically resolved by base64 and XOR decoding the string and using the GetProcAddress API. Each payload in the small sample set of Fevur Loader we acquired was observed to be Lumma Stealer.

Posted in Uncategorized and tagged , .