In the last several days, a new info stealer known as the “Continental stealer” has gained traction in dark web forums. This stealer has the potential to become one of the more powerful participants in the InfoStealer industry, thanks to its simple and easy-to-use architecture. In this report, we will review the stealer infrastructure, features, and functionality.
The Continental Stealer made its initial appearance on October 4th, 2023, and its owner has actively promoted it within dark web forums in recent days. The stealer’s developer maintains a dedicated Telegram channel for disseminating announcements and provides a support contact for direct communication.
While the initial announcement occurred on October 4th, comprehensive information and guidance were released on October 16. Cyberint, in its investigation, identified the earliest references to this threat on the dark web dating back to early November, suggesting that the threat actor has now initiated significant dissemination efforts. Cyberint’s analysis points to a probable Russian origin or motivation behind the threat actor, a subject we will elaborate on later in this report.
The Continental Stealer offers subscription options at $120 for one month, $330 for three months, and $540 for a lifetime subscription.
The stealer’s developer has also published a sample of the log files, which closely aligns with the structure of other well-known stealer families.
The Continental Stealer positions itself as a user-friendly Malware-as-a-Service (MAAS) suitable for individuals with varying levels of experience. Its control panel is designed for ease of use and features a web builder.
It boasts compatibility with systems ranging from Windows 7 (x32) to Windows 11 (x64) and supports both ARM and x86-x64 system architectures. Decryption of data is carried out server-side to ensure that all information collected by the stealer remains encrypted until reaching the server. Additionally, the stealer offers a Telegram bot notification feature that informs users when new logs are received.
As stated by the owner, the Continental Stealer is capable of extracting various system information, including Usernames, Computer Names, IP Addresses, Screen Sizes, CPU and GPU details, RAM, Disk information, and installed applications. Furthermore, it includes a file grabber feature and can extract data from a range of browsers, messaging and email applications, wallets, and additional software.
The Continental Stealer’s user interface is designed to be user-friendly, offering a login panel and an operational dashboard displaying statistics on logs, passwords, cryptocurrency wallets, and credit card information. This dashboard not only provides crucial insights but also facilitates log downloads.
Additionally, the panel includes a builder, eliminating the need for external tools. While the builder is integrated into the MAAS, users are required to specify the Command and Control (C2) server IP, responsible for sending commands to the malware and receiving stolen data. The builder offers customization options such as:
The panel also features a Cookie Converter, providing users with the capability to transform cookies into Netscape format. This conversion procedure entails uploading the cookie file in Netscape format to the converter tool, which subsequently converts the file into JSON format. This functionality facilitates the transfer of cookie data across various web platforms or programming languages that employ distinct cookie formats, thereby enhancing the attacker’s flexibility in handling such data.
Furthermore, users can modify the stealer’s extension and select their preferred .NET framework.
The emergence of the “Continental Stealer” in recent days highlights the dynamic and ever-evolving landscape of information stealers, where new entrants continuously surface. This stealer exemplifies the broad reach and accessibility that information stealers offer, with a straightforward and user-friendly architecture that accommodates threat actors of varying skill levels. This user-friendliness is a significant strength that could attract individuals who may lack the expertise to operate complex information stealers, potentially expanding the community of information stealer operators.
Cyberint excels in accessing high-tier sources that remain elusive to most companies. Our unique ability to penetrate these hidden corners enables us to collect and analyze invaluable data. We enrich our automated collection with a human approach, through research and analysis of our military-grade expert team.
Find new sources in deep and dark web marketplaces, forums, and sites, even if those sources are volatile and difficult to track. Get deep analysis and reports, that allow you to understand a specific threat actor and group profiling, including the places of operation, targeted countries or verticals, TTPs and more. Get a demo and see what assets you have exposed on the deep & dark web.

Fill in your business email to start.
©1994–2025 Check Point Software Technologies Ltd. All rights reserved.
Copyright | Privacy Policy | Cookie Settings | Get the Latest News
  
    
    
	
    Fill in your business email to start