Malware Stealer

n the ever-evolving landscape of cybersecurity, a new threat has emerged: Bandit Stealer. This Go-based information-stealing malware is designed to target multiple browsers and cryptocurrency wallets, all while evading detection.

The Emergence of Bandit Stealer

Bandit Stealer is a recent addition to the malware community. The software is written in the Go programming language, which suggests the potential for cross-platform compatibility. As of the time of writing, it primarily targets the Windows platform.

Privilege Escalation: The Key to Infiltration

One of the critical strategies employed by Bandit Stealer is privilege escalation. The malware uses runas.exe, a command-line utility in Windows that allows it to execute programs with a different user’s credentials. This tactic allows Bandit Stealer to operate with administrative access, potentially circumventing security measures in place on the user’s system.

Evasion Techniques: Stealthy Operations

Bandit Stealer is not just aggressive; it’s stealthy too. The malware uses evasion techniques to detect if it’s running in a sandbox environment and alters its behavior to avoid detection. Moreover, it downloads a blacklist from a Pastebin link, which contains various identifiers to check if it’s running in a sandbox or testing environment. If it detects any of these identifiers, the malware terminates processes related to malware analysis tools.

Persistence: The Long Game

The longevity of the malware on the infected system is one of the critical features of Bandit Stealer. It creates an autorun registry entry to ensure its execution every time the system boots up or restarts. This feature allows the malware to persist even after a system shutdown or reboot, continuously stealing data from the user’s system.

Data Collection: The Loot

Finally, Bandit Stealer collects a trove of data from the victim’s system. This data includes the username, computer name, current IP, hard drive information, details about the victim’s machine, the program runtime of the malware, the victim’s screen size, UAC information, and IP location. All this information is saved in a file named “userinfo.txt” within a specific folder.

Targeting Telegram and Crypto Wallets

In addition to the extensive data collection, Bandit Stealer has a few more tricks up its sleeve. It collects Telegram sessions, potentially allowing the attacker to impersonate the victim and access their private messages and data. Additionally, it checks the folder paths of browsers and cryptocurrencies, potentially providing unauthorized access to personal or confidential information that could be exploited for financial gain.


As we continue to navigate the digital landscape, new threats like Bandit Stealer remind us of the importance of robust cybersecurity measures. Stay informed, stay vigilant, and ensure your systems are protected from such threats.

Leave a Reply

Your email address will not be published. Required fields are marked *