Skip to main content

A New Breed of Infostealer

Medium
Published: Tue May 13 2025 (05/13/2025, 13:12:03 UTC)
Source: AlienVault OTX

Description

A newly discovered .NET-based infostealer, Chihuahua Stealer, combines common malware techniques with advanced features. The infection begins with an obfuscated PowerShell script shared via Google Drive, initiating a multi-stage payload chain. Persistence is achieved through scheduled tasks, and the main payload targets browser data and crypto wallet extensions. Stolen data is compressed, encrypted using AES-GCM via Windows CNG APIs, and exfiltrated over HTTPS. The malware employs stealth techniques, including multi-stage execution, Base64 encoding, hex-string obfuscation, and scheduled jobs. It targets browser data, crypto wallets, and uses unique identifiers for each infected machine. The stealer's sophistication is evident in its use of Windows Cryptography API for encryption and its thorough cleanup process.

AI-Powered Analysis

AILast updated: 06/19/2025, 17:34:19 UTC

Technical Analysis

Chihuahua Stealer is a newly identified .NET-based infostealer malware that demonstrates a sophisticated multi-stage infection and data exfiltration process. The initial infection vector involves an obfuscated PowerShell script distributed via Google Drive, which triggers a chain of payloads. This multi-stage execution approach enhances stealth and complicates detection. Persistence on infected systems is maintained through scheduled tasks, allowing the malware to survive reboots and maintain ongoing access. The primary objective of Chihuahua Stealer is to harvest sensitive information, specifically targeting browser data such as saved credentials, cookies, and autofill information, as well as extensions related to cryptocurrency wallets. This focus on crypto wallets highlights the malware’s intent to steal high-value digital assets. Data exfiltration is conducted securely and covertly: stolen data is compressed and encrypted using AES-GCM encryption implemented via Windows Cryptography Next Generation (CNG) APIs, ensuring confidentiality and integrity of the stolen information during transmission. The malware communicates with its command and control infrastructure over HTTPS, further masking its network traffic. To evade detection, Chihuahua Stealer employs multiple obfuscation techniques including Base64 encoding, hex-string obfuscation, and a thorough cleanup routine that removes traces of its execution. Each infected machine is assigned a unique identifier, facilitating targeted data collection and management by the attackers. The use of native Windows cryptographic APIs and scheduled jobs for persistence reflects a high level of technical sophistication uncommon in many commodity infostealers.

Potential Impact

For European organizations, Chihuahua Stealer poses a significant threat primarily to entities with employees or systems that handle sensitive browser-stored credentials and cryptocurrency assets. The theft of browser data can lead to unauthorized access to corporate accounts, email, and internal systems, potentially resulting in data breaches, financial fraud, and identity theft. The targeting of crypto wallet extensions is particularly concerning for financial institutions, fintech companies, and enterprises involved in blockchain or cryptocurrency operations, as stolen wallet credentials can lead to direct financial losses. The malware’s stealth and persistence mechanisms increase the risk of prolonged undetected compromise, enabling attackers to conduct extended espionage or data theft campaigns. Additionally, the use of Google Drive as an infection vector may exploit trusted cloud services commonly used in European workplaces, increasing the likelihood of successful delivery. The encrypted exfiltration over HTTPS complicates network-based detection, requiring advanced monitoring capabilities. Overall, the malware could disrupt confidentiality and integrity of sensitive data, with moderate impact on availability due to its focus on data theft rather than destructive payloads.

Mitigation Recommendations

European organizations should implement targeted defenses beyond generic controls: 1) Enhance email and cloud file sharing security by deploying advanced threat protection solutions capable of detecting obfuscated PowerShell scripts and multi-stage payloads, especially in Google Drive shared links. 2) Implement strict application whitelisting and PowerShell execution policies to restrict unauthorized script execution, including enforcing Constrained Language Mode and logging PowerShell activity for anomaly detection. 3) Deploy endpoint detection and response (EDR) solutions with behavioral analytics to identify persistence mechanisms such as scheduled tasks and unusual cryptographic API usage. 4) Monitor network traffic for anomalous HTTPS connections to unknown or suspicious domains, leveraging SSL/TLS inspection where privacy policies permit. 5) Educate users on risks associated with opening unsolicited links from cloud services and encourage verification of shared files. 6) Regularly audit browser extensions, particularly crypto wallet extensions, and enforce policies to limit installation to trusted sources. 7) Employ multi-factor authentication (MFA) on all critical accounts to mitigate the impact of credential theft. 8) Conduct frequent backups and maintain incident response plans tailored to data exfiltration scenarios. These measures collectively reduce the attack surface and improve detection and response capabilities against Chihuahua Stealer.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.gdatasoftware.com/fileadmin/_processed_/f/b/G_DATA_Blog_ChihuahuaStealer_Title_999cabe2bc.jpg","https://feeds.feedblitz.com/~/918192962/0/gdatasecurityblog-en~Sit-Fetch-Steal-Chihuahua-Stealer-A-new-Breed-of-Infostealer","https://www.gdatasoftware.com/blog/2025/05/38199-chihuahua-infostealer"]
Adversary

Indicators of Compromise

Hash

ValueDescriptionCopy
hashcdfdc1fde47a5d2899cf09d4c01e00e9
hashdb1d4986391052ad620adef9eb0c181a8ace5c57
hashafa819c9427731d716d4516f2943555f24ef13207f75134986ae0b67a0471b84
hashc9bc4fdc899e4d82da9dd1f7a08b57ac62fc104f93f2597615b626725e12cae8

Url

ValueDescriptionCopy
urlhttps://flowers.hold-me-finger.xyz/index2.php.
urlhttps://onedrive.office-note.com/res?a=c&b=&c=8f2669e5-01c0-4539-8d87-110513256828&s=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiI4YTJlNmI1MDQ4M2E5MWYyODkz

Domain

ValueDescriptionCopy
domaincat-watches-site.xyz
domaincdn.findfakesnake.xyz
domainflowers.hold-me-finger.xyz
domainonedrive.office-note.com

Threat ID: 682c99307960f6956616ac70

Added to database: 5/20/2025, 3:01:04 PM

Last enriched: 6/19/2025, 5:34:19 PM

Last updated: 7/31/2025, 7:37:40 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats