VVS Stealer Obfuscation Tool Leveraging PyArmor to Thwart Static and Signature-Based Detection
First observed on Telegram in April 2025, the malware primarily targets Discord users, extracting credentials, tokens, and account information and exfiltrating it via Discord webhook endpoints.
According to a recent analysis by Palo Alto Networks’ Unit 42, VVS Stealer is written in Python and protected using PyArmor. This legitimate obfuscation tool complicates malware analysis by encrypting and transforming Python bytecode.
Though designed for software protection, PyArmor is now being repurposed by attackers to produce hardened, stealthy malware variants that resist static inspection.
The examined sample, hashed as c7e6591e5e021daa30f949a6f6e0699ef2935d2d7c06ea006e3b201c52666e07, was distributed as a PyInstaller package embedding obfuscated Python bytecode and PyArmor runtime libraries.
Analysts manually reconstructed missing headers and decompiled the payload using PyCDC to recover human-readable code for reverse engineering.
VVS Stealer’s code features multiple encryption layers managed by PyArmor’s AES-128-CTR algorithm, with custom nonces tied to unique license identifiers.
The use of BCC (ByteCode-to-Compilation) mode converts Python functions into C code that is compiled directly into an executable, making conventional decompilers ineffective.
This dual-layer approach ensures both the malware logic and its embedded strings remain hidden from automated scanners.
Further analysis confirmed that the decrypted payload revealed apparent credential theft and system persistence mechanisms. The malware scans browser directories and the Discord LevelDB folder to harvest tokens, then decrypts them using the Windows DPAPI interface.
Using these tokens, it queries various Discord API endpoints to retrieve sensitive user data, including email addresses, payment methods, and Nitro subscription status.
Beyond credential theft, the malware supports session hijacking via injected JavaScript code named injection-obf.js, which modifies Discord’s Electron-based application files to maintain persistence.
The injected script enables monitoring of user actions, such as password changes or billing events, and forwards stolen data to attacker-controlled webhooks.
The stealer also targets major browsers, including Chrome, Edge, Brave, Opera, and Firefox, to exfiltrate cookies, autofill entries, and passwords, compressing the data into ZIP archives before exfiltration.
It maintains persistence by copying itself to the Windows startup folder and uses fake fatal error pop-ups to deceive victims.
Experts warn that VVS Stealer’s extensive PyArmor-based obfuscation signals a growing trend among malware authors of repurposing commercial code-protection tools to evade traditional detection.
Palo Alto recommends updating endpoint and network defenses, leveraging Advanced WildFire, Cortex XDR, and enhanced URL and DNS Security capabilities to counter such evolving threats.
Follow us on Google News , LinkedIn and X to Get More Instant Updates, Set Cyberpress as a Preferred Source in Google.
The post VVS Stealer Obfuscation Tool Leveraging PyArmor to Thwart Static and Signature-Based Detection appeared first on Cyber Security News.
ABILENE, Texas (KTAB/KRBC) - Two men in Abilene, a father and son, were arrested Friday…
According to Reuters, Meta is looking to offset spending on AI and data centers with…
Hulu has decided to scrap Buffy the Vampire Slayer: New Sunnydale, its planned continuation series…
Jostling a folded piece of paper, holding it marooned in the air, selectman Beth Blair…
Boscawen voters cruised through a speedy town meeting Friday night, one with so little controversy…
Happy Saturday, all! This week, we found a number of deals that should help you…
This website uses cookies.