
This week, the SonicWall Capture Labs Threat Research team analyzed a sample of ScarfaceStealer, a Go-compiled information stealer that utilizes sophisticated anti-analysis techniques including:
Initial detection shows an unknown file type, but sections and section data show that the file is a Golang binary. The timestamps have also been tampered with to show a compile time of 1969.


The file is heavily obfuscated with both function calls and strings. During runtime, these do not decode or rename themselves.

At runtime, the following is executed:
LAUNCH_COMMAND, trajectory_calibration, TELEMETRY, orbital_insertion, IGNITION, HANDSHAKE_COMPLETE, MISSION_ABORT, FUEL_SYSTEM_NOMINAL Stage1, Stage2, Stage3, prelaunch, countdown, liftoff ALPHA_ZULU, BRAVO_TANGO, GPS-Galileo-GLONASS trajectory_optimization_score, gravitational_alignment_value quaternary_stabilization_node, quantum_entanglement
Configuration and payloads may be embedded within the binary using Go's embed package.
| DLL | Purpose |
| kernel32.dll | Core Windows operations (file I/O, memory management, process control) |
| ntdll.dll | Low-level NT functions |
| advapi32.dll | Registry operations, security functions |
| ws2_32.dll | Winsock networking |
| dnsapi.dll | DNS query operations |
| crypt32.dll | Cryptographic functions |
| mswsock.dll | Microsoft Windows sockets extensions |
| secur32.dll | Security support provider interface |
| shell32.dll | Shell operations |
| userenv.dll | User environment management |
| iphlpapi.dll | IP helper API (network configuration) |
| netapi32.dll | Network management |
The following exported functions likely contain the core malware logic:
| Function | Likely Purpose |
| main.Allowance | Resource allocation/permission checks |
| main.Coordinate | Data coordination/C2 communication |
| main.Demonstrate | Core functionality (multiple sub-functions) |
| main.Descending | Data exfiltration/download |
| main.Existence | Persistence mechanism checks |
| main.Identifying | Target identification/fingerprinting |
| main.Impossible | Anti-analysis/VM detection |
| main.Introducing | Initialization routines |
| main.Investing | Resource gathering |
| main.Masturbation | Data stealing |
| main.Microphone | Audio capture capability |
| main.Preparing | Pre-exfiltration staging |
| main.Selecting | Target selection |
| main.Solutions | Core stealer logic |
| main.Thumbnails | Image/screenshot capture |
| main.Typically | Standard operations |
Based on code analysis, this stealer likely targets:
The following ciphers are referenced throughout the file:
| Algorithm | Usage |
| AES256 | Data encryption |
| ChaCha20 | Stream cipher |
| SHA3-512 | Hashing |
| BLAKE2b | Hashing |
| RSA1024/RSA2048 | Asymmetric encryption |
| Whirlpool | Hashing |
| TLS 1.0/1.3 | Secure communication |
| Technique ID | Technique Name | Evidence |
| T1059 | Command and Scripting Interpreter | os/exec package |
| T1005 | Data from Local System | File access APIs |
| T1012 | Query Registry | Registry API imports |
| T1082 | System Information Discovery | System info collection |
| T1083 | File and Directory Discovery | File enumeration APIs |
| T1071 | Application Layer Protocol | HTTP/TLS communication |
| T1027 | Obfuscated Files or Information | Space-themed string obfuscation |
| T1041 | Exfiltration Over C2 Channel | Network APIs |
| T1123 | Audio Capture | main.Microphone function |
| T1113 | Screen Capture | main.Thumbnails function |
| T1056 | Input Capture | Credential stealing |
This ScarfaceStealer sample represents a moderately sophisticated Go-based information stealer that employs creative obfuscation techniques to evade detection and hinder analysis. The space/rocket mission themed strings are a unique fingerprint of this malware family. The use of Go provides cross-platform potential while complicating reverse engineering due to Go's unique calling conventions and runtime. The embedded configuration via Go's embed package suggests the malware may be easily repackaged with different C2 configurations.
SonicWall Capture Labs provides protection against this threat via the following signature:
This threat is also detected by SonicWall Capture ATP with RTDMI™ and the Capture Client endpoint solution.
34bf38875030dbee3e231dcfd05505fae829475e68dd2db2f0ec204593cd3212
Share This Article

An Article By
An Article By
Security News
Security News