Threat intelligence

Chihuahua Stealer: Disguising Data Theft in Plain Lyrics

by Security News

A newly identified .NET-based infostealer, called Chihuahua Stealer, was first observed in April 2025. It has been distributed via malicious documents, often hosted on cloud storage platforms such as Google Drive or OneDrive. The malware is primarily designed to exfiltrate saved browser credentials and cryptocurrency wallet data. Notably, it prints Russian rap lyrics to the console, suggesting a possible distraction from its malicious intent.

Infection Cycle

Upon execution, the malware opens a console window that displays Russian rap lyrics.

Fig1_-_russianlyrics.png
Figure 1: Command prompt displaying Russian rap lyrics

This occurs in a function named “DedMaxim,” which prints a string containing the lyrics. The behavior appears purposeless and may be a quirky author signature.

Fig_2_-_dedmaxim_func.png
Figure 2: Execution begins with DedMaxim() displaying rap lyrics

The malware uses unusual names for several internal classes and functions.

Fig_3_-_class_names.png
Figure 3: Example internal class names used by the malware

After the lyrics are displayed, execution proceeds to an internal class named “BackOnMyAss.” First, it queries the machine name and disk serial number using the function Prazdinik() to create a unique ID.

Fig_4._Backonmyass_-_prazdnik.png
Figure 4: Prazdinik() function

This ID becomes the directory name where stolen data is stored via the function Blizkiy().

Fig_5_-_Blizkiy.png
Figure 5: Blizkiy() function

The malware then performs its primary theft routine by executing code within BackOnMyAss.PopilLina().

Fig_6_-_main_program.png
Figure 6: Main program logic referenced within PopilLina()

Fig_7_-Popillina_func.png
Figure 7: Contents of the PopilLina() function

The class “Duckducker” contains the data collection logic and targets browser data and cryptocurrency wallets.

Fig_8_-_target_browsers.png
Figure 8: Targeted browsers

Fig_9_-_crypto_wallets.png
Figure 9: Targeted cryptocurrency wallets

As execution progresses through internal classes, the console prints the string “Sucksuck,” followed by incremental counters, such as “Sucksuck1,” “Sucksuck2,” and “Sucksuck3.”

Finally, the data is encrypted and renamed with the .chihuahua file extension. The function VselLegalno() then transfers the data to an external server. Printing “Sucksuck6” to the console marks completion of the exfiltration.

Fig_10_-_data_transfer_to_exteral_server.png
Figure 10: Silikonovaya.VselLegalno() function responsible for data exfiltration

SonicWall Protections

SonicWall Capture Labs provides protection against this threat via the following signature:

GAV: Chihuahua.STL (Trojan)

This threat is also detected by SonicWall Capture ATP with RTDMI and the Capture Client endpoint solutions.

Share This Article

An Article By

Security News

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.

Related Articles

  • Microsoft Security Bulletin Coverage for August 2025
    Read More
  • Android Malware Campaign Mimics Indian Banks to Harvest Financial Credentials
    Read More