Regions Targeted: Not specified
Related Families: None identified
Key Takeaways
What is PupkinStealer?
PupkinStealer operates as a straightforward infostealer, distinguishing itself from more indiscriminate malware by targeting a curated set of data. Written in C# and compiled with AnyCPU architecture, it is compatible with both x86 and x64 environments. The malware uses the Costura library to embed compressed DLLs, resulting in a high entropy value in its .text section, despite lacking traditional packing. Upon execution, the .NET runtime initializes the Common Language Runtime (CLR) and invokes the Main() method, which orchestrates asynchronous tasks for data harvesting.
PupkinStealer captures sensitive information, including the following:
All stolen data is compressed into a ZIP archive, enriched with metadata such as the victim’s username, public IP address, and Windows Security Identifier (SID). The archive is exfiltrated to a Telegram bot via a crafted API URL. The bot receives the ZIP file with captions detailing victim information, including module success flags, enhancing the attacker’s ability to process stolen data efficiently.
CYFIRMA attributes PupkinStealer to a developer known as “Ardent,” based on embedded code strings. Russian-language text in the Telegram bot’s metadata, including the term “kanal” (Russian for “channel”), suggests a possible Russian origin, though no definitive geographic targeting is confirmed. The malware’s simplicity and lack of sophisticated defenses indicate it is designed for less-sophisticated threat actors, likely distributed through malware-as-a-service (MaaS) models. This accessibility enables rapid monetization via credential theft, session hijacking, and data resale on dark web marketplaces.
PupkinStealer’s use of Telegram for C2 aligns with a broader trend of cybercriminals leveraging legitimate platforms to blend malicious traffic with benign activity, complicating detection efforts. Its focus on e-commerce related data, such as browser credentials and financial platform sessions, poses significant risks to online retailers and their customers. The absence of persistence mechanisms suggests a hit-and-run approach, prioritizing rapid data theft over long-term system compromise. This strategy reduces the malware’s footprint, making it challenging for traditional security solutions to detect during its brief operational window.
PupkinStealer exemplifies the evolving landscape of infostealer, combining simplicity with effective data exfiltration via Telegram. Its lightweight design and reliance on legitimate platforms make it a stealthy threat, particularly for e-commerce entities. PolySwarm analysts consider PupkinStealer to be an emerging threat.
PolySwarm has a sample of PupkinStealer.
9309003c245f94ba4ee52098dadbaa0d0a4d83b423d76c1bfc082a1c29e0b95f
You can use the following CLI command to search for all PupkinStealer samples in our portal:
$ polyswarm link list -f PupkinStealer
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.