PostHole
Compose Login
You are browsing us.zone2 in read-only mode. Log in to participate.
rss-bridge 2026-01-19T00:00:00+00:00

From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers

This blog entry provides an in-depth analysis of the multistage delivery of the Evelyn information stealer, which was used in a campaign targeting software developers.


Malware

From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers

This blog entry provides an in-depth analysis of the multistage delivery of the Evelyn information stealer, which was used in a campaign targeting software developers.

By: Ahmed Mohamed Ibrahim

Jan 19, 2026

Read time: ( words)

Save to Folio


Key takeaways

  • Analysis of the Evelyn Stealer campaign targeting software developers shows that threat actors are weaponizing the Visual Studio Code (VSC) extension ecosystem to deploy a multistage, information-stealing malware.
  • The malware is designed to exfiltrate sensitive information, including developer credentials and cryptocurrency-related data. Compromised developer environments can also be abused as access points into broader organizational systems.
  • This activity affects organizations with software development teams that rely on VSC and third-party extensions as well as those with access to production systems, cloud resources, or digital assets.
  • TrendAI Vision One™ detects and blocks the indicators of compromise (IOCs) outlined in this blog, and provides customers with tailored threat hunting queries, threat insights, and intelligence reports.

On December 8, 2025, Koi.ai published their findings about a campaign specifically targeting software developers through weaponized Visual Studio Code extensions. Here, we’ll provide a more in-depth analysis of the multistage delivery of the Evelyn information stealer.

Evelyn implements multiple anti-analysis techniques to evade detection in research and sandbox environments. It collects system information and harvests browser credentials through DLL injection as well as files and information such as clipboard and Wi-Fi credentials . It can also capture screenshots and steal cryptocurrency wallet. The malware communicates with its command-and-control (C&C) server over FTP.

Attack diagram

[Figure 1. Attack chain of the Evelyn campaign]

Figure 1. Attack chain of the Evelyn campaign

download

Technical analysis**

First stage: Downloader

************

File nameSHA256Type
Lightshot.dll369479bd9a248c9448705c222d81ff1a0143343a138fc38fc0ea00f54fcc1598DLL

Table 1. Details of the first-stage downloader

[Figure 2. Code snippet showing the logic of the first-stage downloader]

Figure 2. Code snippet showing the logic of the first-stage downloader

download

Additionally, the downloader creates a mutual exclusion (mutex) object to ensure that only one instance of the malware can run at any given time, ensuring that multiple instances of the malware cannot be executed on a compromised host.

[Figure 3. Code snippet showing how the mutex object is created and used by the first-stage downloader]

Figure 3. Code snippet showing how the mutex object is created and used by the first-stage downloader

download

The following is the download request sent by the downloader (shown in Figure 2) to download the second-stage injector:

[Figure 4. Download request of the injector.]

Figure 4. Download request of the injector.

download

Second stage: Injector

************

File nameSHA256Type
iknowyou.model92af258d13494f208ccf76f53a36f288060543f02ed438531e0675b85da00430EXE

Table 2: Details of the second-stage injector

The second-stage payload of this malware campaign is a process hollowing injector, designed to decrypt and inject a third-stage payload into the legitimate Windows process, “grpconv.exe”. The malware uses AES-256-CBC encryption to decrypt the final payload, which is a copy of Evelyn Stealer.

Upon execution, the malware dynamically imports Windows APIs and creates a new instance of “grpconv.exe” using “CreateProcessA” with the CREATE_SUSPENDED flag. It then decrypts the final embedded payload (Evelyn Stealer), which is stored within the malware binary using AES-256-CBC encryption algorithm. The malware uses the following AES Key and IV to decrypt the embedded payload:

  • AES Key (32 bytes): 2e649f6145f55988b920ff5a445e63aae29c80495b830e0d8bb4b3fff4b1f6f4
  • IV (16 bytes): 5c507b22e9814428c5f2b1ef213c5c4a

Once the payload is decrypted, the malware injects it into the “grpconv.exe” and resumes the execution of the suspended process.

[Figure 5. Code snippet showing how it creates the “grpconv.exe” process with a “suspend” flag to inject the final payload]

Figure 5. Code snippet showing how it creates the “grpconv.exe” process with a “suspend” flag to inject the final payload

download

Final payload: Evelyn Stealer

File nameSHA256Type
EvelynStealer.exeaba7133f975a0788dd2728b4bbb1d7d948e50571a033a1e8f47a2691e98600c5EXE

Table 3: Details of Evelyn Stealer

Upon execution of Evelyn Stealer, the malware dynamically resolves all Windows APIs needed for malware operations, including process injection, file operations, registry access, network communication, and clipboard access. The malware employs multiple layers of evasion techniques specifically designed to thwart security researchers, automated analysis systems, and sandbox environments.  The malware implements different virtual machine detection methods, debugger detection, and specialized checks for analysis environments like Remote Desktop Protocol (RDP) sessions and Hyper-V.

The following are the list of anti-VM and anti-sandbox techniques used by the malware:

  • GPU analysis: Detects VMware, VirtualBox, Hyper-V, Parallels, QEMU, VirtIO, and basic display adapters
  • Hostname analysis: Checks the computer name for VM indicators
  • Disk size analysis: Flags systems with less than 60 GB of disk space, such as VMs
  • Process analysis: Scans for VM-related processes (e.g., vmtoolsd.exe, vboxservice.exe)
  • Registry analysis: Checks hardware registry keys for VM identifiers, a relatively sophisticated evasion technique to avoid analysis environments

[Figure 6. Evelyn Stealer’s API resolving and evasion logic]

Figure 6. Evelyn Stealer’s API resolving and evasion logic

download

After successful initialization and environment validation, the malware establishes its operational workspace by creating a dedicated folder structure in the user's AppData directory for storing collected data.

[Figure 7. Creation of Evelyn directory to store the collected data]

Figure 7. Creation of Evelyn directory to store the collected data

download

The malware performs a critical preparatory phase that involves recovering any existing browser data and terminating active browser processes. This two-step approach ensures maximum data collection efficiency and eliminates potential conflicts during the injection process, suggesting that the threat actors have a deeper understanding of browser security mechanisms.

[Figure 8. Code snippet showing how the malware recovers browser data and terminates browser processes]

Figure 8. Code snippet showing how the malware recovers browser data and terminates browser processes

The malware then implements a sophisticated multi-tier strategy for acquiring its critical browser injection component “abe_decrypt.dll”. This component is essential for the malware’s capabilities to extract browser credentials and represents a key dependency for successful data theft operations. The malware first checks the TEMP directory, which suggests that it could have been previously deployed or cached from earlier infections. If not found in the TEMP directory, the malware tries to download it from the FTP server. Lastly, it tries to load it from the current directory.

[Figure 9. The acquisition logic of abe_decrypt.dll, Evelyn Stealer’s critical browser injection component]

[...]


Original source

Reply