MonetaStealer is a macOS-focused information stealer that harvests browser data, cryptocurrency wallet credentials, keychain items, Wi-Fi passwords, and other sensitive information using multiple built-in modules.
Symptoms
You might observe the following artifacts associated with this threat:
- Excessive execution of macOS security and networking commands (such as
security find-generic-passwordandnetworksetup -listpreferredwirelessnetworks en0). - Unexpected staging of a stolen data archive named like
STOLEN{sessionID}.zipon the user’s Desktop. - Unusual outbound traffic to external infrastructure (for example Telegram bot APIs) potentially indicating exfiltration attempts.
Technical Breakdown
MonetaStealer is a lightweight macOS-oriented information stealer written in Python and packaged into a Mach-O binary using PyInstaller. Researchers discovered that the threat hides the bulk of its malicious logic within a compressed Python archive extracted at runtime. It intentionally disguises itself as a Windows .exe to exploit default user assumptions and evade naïve scanners that only inspect the outer Mach-O format.
Upon execution, MonetaStealer first confirms it is running on macOS before launching its stealer modules. It targets several classes of sensitive data:
- Browser data: Extracts Chrome passwords, cookies, and browsing history by accessing SQLite databases and using native macOS commands to retrieve encryption master keys needed for decryption.
- Cryptocurrency wallets: Recursively scans common user directories for known wallet files and attempts to extract seed phrases or private keys using regular expression patterns.
- Wi-Fi credentials: Enumerates preferred wireless networks and attempts to retrieve stored keychain SSIDs and passwords using native security utilities.
- Keychain contents: Runs keychain dumps to enumerate and extract items using keyword filtering to identify financial or sensitive entries.
- Financial documents: Examines local documents with common financial keywords and patterns, although this module shows limited effectiveness.
- SSH private keys and clipboard data: Parses the user’s local .ssh directory to capture private key files and reads the system clipboard buffer to collect arbitrary text potentially containing sensitive information.
Stolen data is staged into a zip archive such asSTOLEN{sessionID}.zipon the user’s Desktop. The malware attempts to exfiltrate data to a Telegram bot API under attacker control but researchers have not observed the final archive successfully uploaded in analyzed samples.
Iru researchers have a technical deep-dive into MonetaStealer that can be found here.
Next Steps
Iru Endpoint Detection & Response (EDR) can detect anomalous execution behaviors and unauthorized use of scripting and keychain access when file monitoring and behavioral protections are enabled.
If MonetaStealer is suspected on a device, remove any associated binaries and payload files immediately, and review command history for suspicious system calls indicative of stealer activity. Rotate browser and cloud credentials, reset passwords for financial accounts, and inspect any cryptocurrency wallets for unauthorized access.
In the future, avoid downloading and executing software from unverified sources or social engineering channels, and ensure macOS applications are obtained from trusted official repositories. Because this stealer leverages native utilities such as security find-generic-password, users should verify any unexpected password prompts before providing credentials.
ProcessHub Stealer
ProcessHub stealer is a relatively new finding attributed to China, and is designed to collect user files including bash history, zsh history, GitHub configuration, SSH information, and the Keychain. It completes these actions in a multi-stage process including the downloading of a script from its command and control server, the collection of user files, and the uploading these files.
Learn MoreAtomic Stealer (AMOS)
Atomic Stealer (AMOS) is a sophisticated piece of malware that targets Apple users by masquerading as legitimate applications. Once installed, AMOS can exfiltrate extensive data, including keychain passwords, user documents, system information, browser data, credit card information, and cryptocurrency wallets. There is a strong association between Atomic Stealer and Russian-speaking cybercriminal communities.
Learn MoreCthulhu
Cthulhu is a macOS stealer that masquerades as legitimate software to deceive users into installing it. Once executed, it collects sensitive information, including system data, browser credentials, cryptocurrency wallets, and game account details. Cthulhu has also been known to target enterprise environments to conduct cyber espionage campaigns.
Learn More