Posted in

SolyxImmortal Malware: A Stealthy Python-Based Threat Targeting Windows Systems

In January 2026, researchers identified a new Python-based malware strain named SolyxImmortal—a silent, persistent, and highly evasive surveillance tool engineered to blend seamlessly into Windows environments. Unlike commodity stealers that rely on noisy, predictable behaviors, SolyxImmortal demonstrates operational sophistication, stealth, and advanced exfiltration techniques leveraging trusted cloud platforms like Discord.

For CISOs, SOC analysts, and incident responders, this malware represents a growing category of lightweight, modular, cloud-enabled espionage tools designed for long-term endpoint monitoring and data theft.

This article examines the malware’s architecture, persistence tactics, credential extraction methods, exfiltration channels, MITRE ATT&CK mapping, and actionable defense strategies.


What Is SolyxImmortal?

SolyxImmortal is a compact yet powerful Python-based Windows surveillance malware focusing on:

  • Credential theft
  • Keystroke logging
  • Screenshot capture
  • Document harvesting
  • Persistence
  • Covert exfiltration via Discord webhooks

Key characteristics include:

  • Silent execution
  • Hardcoded C2 parameters
  • No external configs
  • Advanced cleanup routines
  • Low forensic residue
  • Continuous data collection in multi-threaded mode

The malware presents itself as Lethalcompany.py and circulates anonymously across Telegram-based underground channels, often used for distributing stealers and OPSEC-light malware tools.


Technical Specifications

File Attributes

AttributeValue
FilenameLethalcompany.py
File Size10.29 KB
File TypePython Script
Code SigningUnsigned
MD52690f7c685784fff006fe451fa3b154c
SHA-2565a1b440861ef652cc207158e7e129f0b3a22ed5ef5d2ea5968e1d9eff33017bc
First ObservedJanuary 2026
Distribution VectorTelegram underground channels

Execution Model

Once launched, the malware:

  • Copies itself into %AppData% under a Windows-like filename
  • Registers under HKCU\Software\Microsoft\Windows\CurrentVersion\Run
  • Executes without needing admin privileges
  • Spawns multiple threads for continuous monitoring

Despite its sophistication, SolyxImmortal does not propagate laterally, suggesting the operator prioritizes targeted endpoint-level data theft rather than network-wide compromise.


How SolyxImmortal Harvests Data

1. Credential Theft From Chromium Browsers

Targets include:

  • Google Chrome
  • Microsoft Edge
  • Brave

The workflow:

  1. Extracts the master key from Local State
  2. Uses AES-GCM with Windows DPAPI bindings
  3. Decrypts saved login credentials
  4. Stores plaintext passwords locally
  5. Compresses them into ZIP archives
  6. Sends them via HTTPS POST to Discord webhook endpoints

This technique leverages Discord’s trusted domain reputation, bypassing proxy filtering and network security tools.


2. Keystroke Logging

SolyxImmortal uses persistent keyboard hooks that:

  • Capture keystrokes in memory
  • Translate special keys (Enter, Backspace, Ctrl) into readable labels
  • Periodically exfiltrate logs at fixed intervals to lower detection risk

This design minimizes network noise and avoids behavioral triggers.


3. Screenshot Capture & Visual Surveillance

The malware monitors foreground window titles for sensitive keywords tied to:

  • Financial services
  • Authentication portals
  • Email sign-ins
  • Cloud accounts

When detected, SolyxImmortal immediately:

  • Captures a screenshot
  • Sends it to a dedicated screenshot-only webhook

Routine screenshots are also taken at intervals to maintain continuous visibility.


4. Document and File Harvesting

The malware scans user directories for:

  • PDF documents
  • Text files
  • Office documents
  • Authentication artifacts

Harvested items are:

  • Zipped
  • Staged in the TEMP directory
  • Sent to the structured-data webhook
  • Deleted after transmission

This ensures minimal forensic artifacts.


Network Communication and C2 Behavior

Discord Webhooks as C2 Channels

SolyxImmortal maintains two separate Discord webhooks:

  1. Primary: credentials, logs, ZIP archives
  2. Secondary: screenshots only

Why Discord?

  • Trusted infrastructure
  • Encrypted HTTPS
  • High availability
  • Difficult to block without collateral damage

All outbound traffic is HTTPS over standard ports, blending in with normal network behavior.

After exfiltration, SolyxImmortal clears temporary files to minimize visibility.


Threat Actor Profile

OSINT and code-linguistic analysis suggest:

  • Medium-confidence attribution to a Turkish-speaking actor
  • Activity patterns consistent with:
    • Hacktivist coordination
    • Opportunistic cyber theft
    • Low-to-mid sophistication groups

The malware’s design—simple delivery but stealthy exfiltration—suggests:

  • Targets: individual users and small businesses
  • Use cases: credential theft, account takeover, financial fraud, extortion-enabling surveillance

Its modular structure allows it to be repurposed for more advanced campaigns.


MITRE ATT&CK Mapping

TacticTechnique IDDescription
ExecutionT1059.006Python interpreter execution
PersistenceT1547.001Registry Run key persistence
Credential AccessT1555.003Browser password extraction
Credential AccessT1552.001Unsecured credential files
CollectionT1056.001Keylogging
CollectionT1113Screen capture
DiscoveryT1083File and directory discovery
ExfiltrationT1041C2 exfiltration over HTTPS
Command and ControlT1102.003Abuse of third-party web services (Discord)
Defense EvasionT1027Obfuscated/compressed data

Common Misconceptions About Python Malware

“Python scripts are easy to detect.”

Packaged Python files appear as normal executables and evade signature-based tools.

“Discord traffic is always benign.”

Modern stealers increasingly use high-reputation cloud apps for covert C2.

“Small malware = low impact.”

At just 10 KB, SolyxImmortal demonstrates how minimal code can deliver maximum surveillance and credential compromise.


Defensive Recommendations

1. Behavioral Detection

Monitor:

  • Abnormal access to Local State browser files
  • Unexpected screenshot and input hooks
  • Access to %AppData% by unknown executables
  • Registry Run key modifications
  • Outbound HTTPS traffic to Discord webhooks

2. Network Controls

  • Block or monitor webhook URLs
  • Enable SSL/TLS inspection where compliant
  • Apply DNS filtering to detect anomalous Discord traffic
  • Restrict high-risk process network access

3. Endpoint Hardening

  • Enable application allowlisting
  • Restrict execution of unsigned Python-based binaries
  • Protect browser credential storage
  • Enforce strong MFA policies

4. Incident Response Actions

During triage:

  • Inspect HKCU run keys
  • Review %AppData% and TEMP directories
  • Look for unauthorized Python executables
  • Hunt for ZIP archives or residual credential dumps
  • Analyze outbound webhook communications

Conclusion

SolyxImmortal represents the evolution of lightweight malware—simple to distribute, hard to detect, and built for persistent, continuous data theft. With its multi-threaded surveillance engine, browser credential extraction, and covert Discord-based exfiltration, this malware poses a serious risk to individuals and small organizations.

For defenders, detection requires a multi-layered approach focused on behavioral analytics, browser credential protection, webhook monitoring, and endpoint visibility.

Strengthening defenses against SolyxImmortal and malware like it is critical for maintaining secure Windows environments.

Leave a Reply

Your email address will not be published. Required fields are marked *