
New ACRStealer Variant Uses Syscall Evasion, TLS C2 and Secondary Payload Delivery
The threat landscape is in constant flux, and threat actors consistently refine their tactics, techniques, and procedures (TTPs) to maximize impact and evade detection. A recent emergence on this evolving battlefield is a new, significantly advanced variant of ACRStealer, now featuring capabilities that challenge traditional cybersecurity defenses. This iteration, first highlighted by Proofpoint, represents a rebranding effort from the previously known Amatera Stealer, introducing sophisticated evasive mechanisms and robust command-and-control (C2) communication methods.
Understanding ACRStealer’s Evolution
ACRStealer has been a persistent nuisance in the realm of information stealer malware. However, this latest variant marks a considerable leap in its sophistication. Its predecessor, the Amatera Stealer, was already designed to exfiltrate sensitive data. This new version takes those core capabilities and amplifies them with features designed to bypass even advanced security solutions, making detection and mitigation far more challenging for organizations.
Syscall Evasion: A Deeper Level of Stealth
One of the most concerning enhancements in this ACRStealer variant is its implementation of low-level syscall evasion. Traditional malware often interacts with the operating system through high-level APIs. Security products frequently monitor these API calls for malicious patterns. By utilizing direct syscalls, ACRStealer bypasses these API hooks, effectively operating beneath the radar of many endpoint detection and response (EDR) and antivirus (AV) systems.
- How it works: Instead of calling standard Windows API functions (e.g.,
CreateRemoteThread), the malware directly invokes the underlying kernel system calls (e.g.,NtCreateThreadEx). - Impact: This technique makes it significantly harder for security tools to identify and block malicious activity, as their detection logic often relies on monitoring the higher-level API layer.
Encrypted TLS C2 Communication: Hiding in Plain Sight
Command-and-control (C2) communication is the lifeline of most malware, allowing threat actors to issue commands, exfiltrate data, and deploy additional payloads. Previous variants might have used less secure or more easily identifiable C2 channels. This new ACRStealer variant now employs encrypted C2 communication over TLS (Transport Layer Security).
Key implications of TLS C2:
- Evasion of Network Defenses: TLS encrypts the traffic between the compromised system and the C2 server, making it difficult for network intrusion detection systems (NIDS) or firewalls to inspect the content of the communication for malicious indicators.
- Blends with Legitimate Traffic: Encrypted TLS traffic is ubiquitous in modern networks (e.g., HTTPS for web browsing). This allows the malware’s C2 communications to blend in with legitimate network activity, evading detection that flags unencrypted or anomalous traffic.
- Data Exfiltration: Sensitive data stolen by ACRStealer can be exfiltrated through these encrypted channels, making it difficult for organizations to determine what information has left their network.
Secondary Payload Delivery: Expanding the Attack Surface
Beyond its initial information-stealing capabilities, this ACRStealer variant also features the ability to deliver secondary payloads. This represents a significant escalation, transforming the stealer from a singular threat into a potential gateway for further, more devastating attacks.
- Modular Attack Capability: Threat actors can leverage the compromised system to download and execute additional malware, such as ransomware, cryptocurrency miners, or remote access Trojans (RATs).
- Increased Damage Potential: The initial compromise with ACRStealer could be a stepping stone to a full-blown network intrusion or data breach, escalating the potential impact and recovery costs for affected organizations.
- Dynamic Threat Evolution: The ability to deliver secondary payloads means the threat posed by a single ACRStealer infection can dynamically change and adapt over time, based on the attacker’s objectives.
Remediation Actions for ACRStealer
Given the advanced nature of this ACRStealer variant, a multi-layered and proactive defense strategy is imperative. Organizations must strengthen their security posture to detect and mitigate these sophisticated threats.
- Enhanced Endpoint Security:
- Deploy EDR solutions with advanced behavioral analysis capabilities that can detect anomalies even at the syscall level.
- Ensure antivirus and anti-malware solutions are up-to-date and configured for aggressive scanning.
- Implement application whitelisting to prevent unauthorized executables from running.
- Network Traffic Analysis:
- Utilize network detection and response (NDR) tools capable of deep packet inspection and behavioral analysis of encrypted traffic (e.g., through TLS decryption where legally and practically feasible, or by analyzing metadata and traffic patterns).
- Implement robust firewall rules to restrict outbound connections to known malicious IP addresses and domains.
- User Awareness Training:
- Educate employees about phishing, social engineering tactics, and the dangers of clicking on suspicious links or opening unsolicited attachments, as initial infection often relies on these vectors.
- Patch Management:
- Regularly update operating systems, applications, and firmware to patch known vulnerabilities (e.g., consider CVE-2023-21554 for critical Microsoft vulnerabilities or relevant CVEs impacting third-party software).
- Threat Intelligence Integration:
- Integrate the latest threat intelligence feeds into security tools to identify indicators of compromise (IOCs) associated with ACRStealer and similar threats.
| Tool Name | Purpose | Link |
|---|---|---|
| Osquery | Endpoint visibility and behavioral analysis | https://osquery.io/ |
| Snort | Network intrusion detection and prevention | https://www.snort.org/ |
| Mandiant Advantage | Threat intelligence and incident response support | https://www.mandiant.com/advantage |
| Sigma Rules | Generic signature format for SIEM systems | https://github.com/SigmaHQ/sigma |
Conclusion
The emergence of this advanced ACRStealer variant underscores the critical need for robust, multi-layered cybersecurity defenses. Its use of syscall evasion, encrypted TLS C2, and secondary payload delivery capabilities presents a formidable challenge to organizations. By focusing on enhanced endpoint security, comprehensive network monitoring, proactive patch management, and continuous threat intelligence, businesses can better protect themselves against these evolving threats and safeguard their critical assets.


