Threat Advisories:
Hive Pro recognized in Gartner® Magic Quadrant™ for Exposure Assessment Platform, 2025 Watch platform in action

Evelyn Stealer’s Stealth Campaign Against Developers

Amber | Attack Report
Download PDF

Summary

The Evelyn Stealer campaign represents a sophisticated, multi-stage information-stealing operation targeting software developers worldwide through weaponized Visual Studio Code extensions. First detected on December 8, 2025, this attack leverages the trusted VS Code extension ecosystem to deliver malicious payloads disguised as legitimate development tools. The Evelyn Stealer malware employs advanced techniques including DLL sideloading, PowerShell execution, and process hollowing to establish persistence and evade detection on Windows systems.

The malware campaign specifically targets developers in the software development and technology industries, capitalizing on implicit trust in development environments. Once embedded, Evelyn Stealer systematically harvests sensitive data including browser credentials, cryptocurrency wallet information, Wi-Fi passwords, clipboard contents, and comprehensive system metadata. The stolen information is packaged into ZIP archives and exfiltrated to attacker-controlled FTP infrastructure, demonstrating a mature and deliberate approach to targeting developer ecosystems.

Attack Details

Initial Compromise Through Malicious VS Code Extensions

The Evelyn Stealer attack begins with threat actors distributing weaponized Visual Studio Code extensions that masquerade as legitimate development tools. These malicious extensions abuse the trusted VS Code extension ecosystem, blending seamlessly into developer workflows. The initial payload presents itself as a legitimate Lightshot DLL component, executed alongside the genuine Lightshot.exe executable to maintain credibility and avoid suspicion.

The malicious DLL imitates expected Lightshot behavior while executing hidden payload operations in parallel. To prevent duplicate execution and maintain stealth, the Evelyn malware enforces a singleton model using internal checks and mutex mechanisms. This stage spawns a concealed PowerShell process to download the second-stage payload, saved as “runtime.exe” in the local temporary directory, ensuring seamless transition without alerting the targeted developer.

Multi-Stage Payload Deployment and Process Injection

The second-stage Evelyn Stealer payload functions as a process hollowing injector responsible for deploying the final malware component. This stage decrypts the third-stage payload using AES-256-CBC encryption with predefined keys and initialization vectors. The decrypted payload is then injected into the legitimate Windows process “grpconv.exe” through advanced process hollowing techniques.

Once execution resumes, Evelyn Stealer dynamically resolves Windows APIs required for process injection, file system interaction, registry access, clipboard monitoring, and network communication. These actions are deliberately obfuscated, reflecting strong focus on evasion and resilience against both manual analysis and automated security defenses deployed in enterprise environments.

Anti-Analysis and Environment Validation

Before initiating large-scale data theft operations, the Evelyn malware conducts extensive environmental checks to confirm it is not operating in virtualized or sandboxed environments. These anti-analysis checks include GPU profiling, hostname validation, disk size inspection, process enumeration, and registry key analysis. Only after determining the environment is trustworthy does Evelyn Stealer create dedicated directory structures within the user’s AppData folder to stage its operations.

The malware prepares for credential harvesting by terminating active browser processes and locating its decryption component, “abe_decrypt.dll,” either locally or by retrieving it from attacker-controlled FTP servers if necessary. This systematic approach demonstrates the campaign’s focus on maintaining operational security throughout the attack lifecycle.

Comprehensive Data Harvesting and Exfiltration

With all components in place, Evelyn Stealer proceeds to harvest browser credentials through DLL injection techniques, capture desktop screenshots, and collect extensive sensitive data. The malware targets system information, clipboard contents, Wi-Fi credentials, and cryptocurrency wallet details, consolidating all stolen data into compressed ZIP archives.

The exfiltration phase transmits stolen information to attacker command-and-control infrastructure over FTP using structured filenames for tracking and organization. This developer-targeted attack illustrates a mature and deliberate approach to supply chain compromise, transforming trusted development tools into effective delivery mechanisms for information theft operations.

Recommendations

Audit and Vet VS Code Extensions

Review all installed Visual Studio Code extensions within your development environment and remove any unrecognized or untrusted extensions, particularly those published by unverified developers or with low download counts and no reviews.

Implement Extension Whitelisting

Establish an approved list of VS Code extensions for your organization and configure policies to prevent installation of extensions outside the whitelist, reducing the risk of trojanized extension installation.

Deploy Endpoint Detection Rules

Implement detection rules for the specific file hashes and behavioral indicators associated with this campaign, including monitoring for process injection, suspicious PowerShell execution from VS Code contexts, and FTP traffic to unknown destinations.

Monitor PowerShell Activity

Enable comprehensive PowerShell logging, including script block logging and module logging, to detect hidden PowerShell commands used by the malware downloader component.

Restrict Browser Launch Parameters

Monitor and alert on browser processes launched with suspicious command-line arguments such as headless mode, disabled sandbox, or off-screen window positioning that indicate potential credential theft activity.

Implement Zero-Trust for Development Environments

Apply zero-trust architecture principles specifically to developer workstations and development workflows, treating these as high-value assets with access to production systems and intellectual property.

Isolate Cryptocurrency Operations

Separate cryptocurrency wallet access and operations from development systems to prevent credential theft from compromising digital assets.

Indicators of Compromise (IoCs)

File Hashes (SHA256)
  • 369479bd9a248c9448705c222d81ff1a0143343a138fc38fc0ea00f54fcc1598
  • 92af258d13494f208ccf76f53a36f288060543f02ed438531e0675b85da00430
  • aba7133f975a0788dd2728b4bbb1d7d948e50571a033a1e8f47a2691e98600c5
  • 74e43a0175179a0a04361faaaaf05eb1e6b84adca69e4f446ef82c0a5d1923d5
Malicious Files
  • Lightshot.dll
  • iknowyou.model
  • EvelynStealer.exe
  • abe_decrypt[1].dll
  • server09.mentality.cloud
  • syn1112223334445556667778889990.org

MITRE ATT&CK TTPs

Tactics
  • TA0001: Initial Access
  • TA0002: Execution
  • TA0003: Persistence
  • TA0005: Defense Evasion
  • TA0006: Credential Access
  • TA0007: Discovery
  • TA0009: Collection
  • TA0010: Exfiltration
  • TA0011: Command and Control
Techniques
  • T1566: Phishing
  • T1059: Command and Scripting Interpreter
  • T1059.001: PowerShell
  • T1574: Hijack Execution Flow
  • T1574.001: DLL Side-Loading
  • T1055: Process Injection
  • T1055.012: Process Hollowing
  • T1497: Virtualization/Sandbox Evasion
  • T1497.001: System Checks
  • T1140: Deobfuscate/Decode Files or Information
  • T1555: Credentials from Password Stores
  • T1555.003: Credentials from Web Browsers
  • T1113: Screen Capture
  • T1115: Clipboard Data
  • T1005: Data from Local System
  • T1057: Process Discovery
  • T1041: Exfiltration Over C2 Channel
  • T1071: Application Layer Protocol
  • T1071.002: File Transfer Protocols

References

https://www.trendmicro.com/en_us/research/26/a/analysis-of-the-evelyn-stealercampaign.html

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox