GBHackers

Node.js LTX Stealer Emerges as New Threat to Login Credentials


A new, sophisticated malware campaign dubbed “LTX Stealer.” This malware represents a shift in attacker techniques, utilizing legitimate software frameworks and cloud services to hide its activities and steal sensitive user data.

By mimicking standard Windows processes, LTX Stealer is designed to operate quietly, making it difficult for traditional antivirus systems to detect.

The malware is distributed through a heavily disguised installer built with “Inno Setup,” a common tool used by legitimate developers to create Windows software installers.

The malicious file, identified in this campaign as “Negro.exe,” appears to be a standard application. However, distinct metadata tags explicitly reference the LTX Stealer, signaling its true nature.

To evade detection, the installer contains a massive, encrypted archive. Approximately 99.9% of the file contents are encrypted, preventing security tools from scanning the malicious code inside.

At CYFIRMA, we observed attacker techniques that rely on legitimate installers and user trust to enable low noise system compromise. 

Several components were notable, including updater.exe, a bundled python.exe with associated runtime libraries, multiple SQLite database file.

Embedded Payload (Source : CYFIRMA).

Once a victim runs the installer, it requests administrator privileges. If granted, it drops a payload named updater.exe into a hidden system folder designed to look like a Microsoft update component.

Under the Hood: Node.js and Obfuscation

What makes LTX Stealer unique is its internal architecture. The updater.exe file is not a standard virus but a bundled Node.js runtime environment.

The attackers use a tool called pkg to package the malicious JavaScript code with the runtime.

By duplicating the LSASS access token and applying it to the current execution thread, the code temporarily executes under SYSTEM context.


LSASS Impersonation and SYSTEM Access  (Source : CYFIRMA).
LSASS Impersonation and SYSTEM Access (Source : CYFIRMA).

Furthermore, the attackers employ “Bytenode” compilation. Instead of leaving the malicious code as readable JavaScript, they compile it into bytecode.

This technique deliberately hinders security researchers’ attempts to reverse-engineer or analyze the malware’s logic.

Once active, LTX Stealer aggressively targets sensitive information. It primarily focuses on Chromium-based web browsers like Google Chrome and Microsoft Edge.

The malware includes a Python script (decrypt.py) that mimics the browser’s own decryption processes. This allows the attackers to bypass encryption protections and extract:

  • Saved login credentials (usernames and passwords).
  • Browser cookies.
  • Active session tokens.

In addition to browser data, LTX Stealer specifically hunts for cryptocurrency assets. It scans the infected computer for wallet files and data from browser-based crypto extensions, packaging everything into an archive for exfiltration.

Infrastructure and Business Model

The malware’s backend infrastructure relies on legitimate cloud services to blend in with normal network traffic.

The malware resolved the domain api.eqp.lol, which returned the following IP addresses:

  • 172.67.153.236
  • 104.21.12.237
Further investigation identified an additional panel server hosted on a separate IP address: 69[.]164.242.27 (Source : CYFIRMA).
Further investigation identified an additional panel server hosted on a separate IP address: 69[.]164.242.27 (Source : CYFIRMA).

It uses Supabase for authentication and database management, and Cloudflare to hide the location of its command-and-control servers.

CYFIRMA analysis suggests that LTX Stealer is being operated as a “Stealer-as-a-Service” (SaaS).

The malware is advertised on public channels for as little as $10 per week or $25 per month. Evidence points to the developers likely being based in Brazil, as early samples and pricing structures align with activity in that region.

This low-cost, scalable model indicates that LTX Stealer is designed for widespread, indiscriminate attacks rather than targeted espionage.

INDICATORS OF COMPROMISES

IndicatorTypeRemarks
eqp[.]lolDomainPanel
69[.]164.242.27DomainPanel
ca9798f6bb9ad81dc20f8dee10c19368a44f3e48d71fa823b9c6f3b6473ca518SHA256Updater.exe (Dropped Node.js–based packaged stealer)

112d731bbfd7379cdf3263cbba39a170c235d616c26b803f3afe6b014f4748a1
SHA256Negro.exe (Setup file)

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link