Bogus website fakes virus scan, installs Venom Stealer instead
A fake website impersonating Avast antivirus tricks users into downloading Venom Stealer malware by running a fake virus scan and prompting a malicious download disguised as a system cleaner. Venom Stealer steals browser credentials, session cookies, cryptocurrency wallets, and other sensitive data. It employs evasion techniques such as direct system calls and debugger checks to avoid detection. The stolen data is exfiltrated to a command-and-control server disguised as an analytics service. This campaign uses scare tactics and brand impersonation to deceive users into infecting their systems.
AI Analysis
Technical Summary
This threat involves a malicious website that impersonates the Avast antivirus brand to deceive users into running a fake virus scan. The site falsely reports threats and prompts users to download a malicious file posing as a system cleaner. This file is part of the Venom Stealer malware family, which targets sensitive information including browser credentials, session cookies, and cryptocurrency wallets. The malware uses evasion techniques such as direct system calls and debugger detection to avoid security tools. Exfiltration of stolen data is conducted to a command-and-control server masked as an analytics service. The campaign exemplifies a scare-and-fix scam leveraging brand trust to distribute malware.
Potential Impact
Successful infection results in theft of sensitive user data including browser credentials, session cookies, and cryptocurrency wallets. The malware's evasion techniques reduce the likelihood of detection by security software. Data exfiltration to a disguised command-and-control server enables attackers to collect stolen information for further malicious use. There are no known exploits in the wild beyond this campaign, and no direct patch or fix is applicable as this is a social engineering and malware distribution threat.
Mitigation Recommendations
No official patch or fix is available since this is a social engineering attack involving a fake website and malware distribution. Users should be educated to avoid downloading software from untrusted or suspicious websites, especially those impersonating legitimate brands. Security teams should update endpoint protection solutions to detect Venom Stealer and monitor for indicators such as the hashes and domain 'app-metrics-cdn.com' associated with this campaign. Blocking access to known malicious domains and educating users about scare-and-fix scams are recommended mitigations.
Indicators of Compromise
- hash: 0a32d6abea15f3bfe2a74763ba6c4ef5
- hash: ecbeaa13921dbad8028d29534c3878503f45a82a09cf27857fa4335bd1c9286d
- domain: app-metrics-cdn.com
Bogus website fakes virus scan, installs Venom Stealer instead
Description
A fake website impersonating Avast antivirus tricks users into downloading Venom Stealer malware by running a fake virus scan and prompting a malicious download disguised as a system cleaner. Venom Stealer steals browser credentials, session cookies, cryptocurrency wallets, and other sensitive data. It employs evasion techniques such as direct system calls and debugger checks to avoid detection. The stolen data is exfiltrated to a command-and-control server disguised as an analytics service. This campaign uses scare tactics and brand impersonation to deceive users into infecting their systems.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a malicious website that impersonates the Avast antivirus brand to deceive users into running a fake virus scan. The site falsely reports threats and prompts users to download a malicious file posing as a system cleaner. This file is part of the Venom Stealer malware family, which targets sensitive information including browser credentials, session cookies, and cryptocurrency wallets. The malware uses evasion techniques such as direct system calls and debugger detection to avoid security tools. Exfiltration of stolen data is conducted to a command-and-control server masked as an analytics service. The campaign exemplifies a scare-and-fix scam leveraging brand trust to distribute malware.
Potential Impact
Successful infection results in theft of sensitive user data including browser credentials, session cookies, and cryptocurrency wallets. The malware's evasion techniques reduce the likelihood of detection by security software. Data exfiltration to a disguised command-and-control server enables attackers to collect stolen information for further malicious use. There are no known exploits in the wild beyond this campaign, and no direct patch or fix is applicable as this is a social engineering and malware distribution threat.
Mitigation Recommendations
No official patch or fix is available since this is a social engineering attack involving a fake website and malware distribution. Users should be educated to avoid downloading software from untrusted or suspicious websites, especially those impersonating legitimate brands. Security teams should update endpoint protection solutions to detect Venom Stealer and monitor for indicators such as the hashes and domain 'app-metrics-cdn.com' associated with this campaign. Blocking access to known malicious domains and educating users about scare-and-fix scams are recommended mitigations.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securityboulevard.com/2026/03/bogus-avast-website-fakes-virus-scan-installs-venom-stealer-instead/"]
- Adversary
- null
- Pulse Id
- 69c6cf837e2aed0cef563493
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0a32d6abea15f3bfe2a74763ba6c4ef5 | — | |
hashecbeaa13921dbad8028d29534c3878503f45a82a09cf27857fa4335bd1c9286d | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainapp-metrics-cdn.com | — |
Threat ID: 69d636951cc7ad14da612bfb
Added to database: 4/8/2026, 11:05:57 AM
Last enriched: 4/8/2026, 11:21:10 AM
Last updated: 4/9/2026, 4:45:39 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.