TL;DR - spoiler
Static analysis of a StealC infostealer that uses the Heaven’s Gate technique to transition from 32-bit to 64-bit mode, trying to bypassing EDR hooks. Features RC4-encrypted config strings, a custom “MZER” payload marker, and direct syscalls. Successfully extracted the C2 server, decryption key, and 150+ encrypted strings without dynamic execution.
Key artifacts:
- C2:
http://23¤94¤252¤171/60cdc8e27a6d4451.php - RC4 Key:
9vX9oFZSsq - Campaign ID:
30502a69951942c7 - Family: StealC (builder v2)