Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

Coinbase Board and CEO Brian Armstrong Face Shareholder Lawsuit

March 6, 2026

EtherMail adds email identity for AI agents

March 6, 2026

SuperRare Liquid Editions: The Next Evolution of NFTs

March 6, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026

    Canada launches new multi-crypto ETF as banks enter the sector

    March 6, 2026

    Bitcoin Price Debate Ignites as Bull Trap Warning Clashes With On-Chain Data

    March 6, 2026

    Top Analyst Reveals What’s Next For Bitcoin, Ethereum and XRP

    March 5, 2026

    Ethereum Price Analysis: Institutional Buying Returns as Whales Accumulate

    March 5, 2026

    Ethereum Hovers at $2,150 — Can ETH Price Rally to $2,400 or Stall Below $2,200?

    March 5, 2026

    Vitalik Buterin Admits Ethereum Hasn’t Meaningfully Improved People’s Lives

    March 5, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    Bitcoin Liquidity Set To Expand With Morgan Stanley BTC ETF Option

    March 6, 2026

    Bitcoin Suppressed By Shadow Banking Rehypothecation: Saylor

    March 5, 2026

    XRP Price Retests Decade-Old Trendline That Previously Triggered 630%+ Rallies

    March 5, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    US Ranks #1 in CoinGecko Global Meme Coin Interest Report

    December 18, 2025

    Coinbase Board and CEO Brian Armstrong Face Shareholder Lawsuit

    March 6, 2026

    EtherMail adds email identity for AI agents

    March 6, 2026

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    EtherMail adds email identity for AI agents

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    Startale App Integrates Kyo Finance to Power Seamless Swaps on Soneium

    March 6, 2026

    ICB Network and Mokoko AI Entail Strategic Partnership to Transform Web3 Gaming Infrastructure

    March 6, 2026

    Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

    March 4, 2026

    DOJ seizures of $580M expose how crypto investment scams scaled into shift work with quotas and scripts

    March 3, 2026

    Aeternum Botnet Shifts Command Control to Polygon Blockchain

    February 27, 2026

    Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

    February 26, 2026

    Coinbase Board and CEO Brian Armstrong Face Shareholder Lawsuit

    March 6, 2026

    EtherMail adds email identity for AI agents

    March 6, 2026

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026
  • Web 3
    1. Gaming
    2. View All

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    METYA Partners With Kult Games to Expand Web3 Gaming Ecosystem

    March 6, 2026

    AurumX Collaborates with FishWar to Redefine Web3-Based Gaming Economies

    March 5, 2026

    C. Thi Nguyen: Prioritizing enjoyment over efficiency in games, the pitfalls of social media scoring systems, and how metrics can obscure true value

    March 4, 2026

    Coinbase Board and CEO Brian Armstrong Face Shareholder Lawsuit

    March 6, 2026

    EtherMail adds email identity for AI agents

    March 6, 2026

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    Coinbase Board and CEO Brian Armstrong Face Shareholder Lawsuit

    March 6, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Reform UK tops donations with millions from Thailand-based crypto investor: Report

    March 6, 2026

    Donald Trump’s crypto legacy in two words: Paul Atkins

    March 6, 2026

    XRP and XRPL get a credibility lift from Ripple’s expanding footprint

    March 5, 2026

    XRP rewrites the playbook for altcoin ETF approvals to surge in late 2026 after a wave of futures listings

    March 4, 2026

    Bitcoin ETF custody concentrates power in one place, and now a single operational failure causes dangerous ripples

    March 3, 2026

    Revolut’s stablecoin test targets its 12M UK users

    March 3, 2026

    Coinbase Board and CEO Brian Armstrong Face Shareholder Lawsuit

    March 6, 2026

    EtherMail adds email identity for AI agents

    March 6, 2026

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026
  • Analysis

    XRP Price Consolidates Under $1.5 — What Could Drive the Next Move to $2?

    March 5, 2026

    Israel’s weekly $3B Iran war cost equals over 41,000 Bitcoin

    March 5, 2026

    Chainlink Price Gains Attention After Visa e-HKD Pilot and LINK Chart Signals Possible Breakout

    March 5, 2026

    Can the Bulls Push the Price to $1.16 as $1 Resistance is Back in Focus

    March 5, 2026

    Bitcoin investors may not need altcoins to diversify if tokenized stocks move on-chain

    March 5, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    What Is Farcaster? The Decentralized Social Media Protocol

    February 10, 2026

    What Is Venice AI? The Privacy-Focused Chatbot

    January 13, 2026

    Crypto platform aims to let retail investors buy IPO shares at the same price as Wall Street insiders

    March 6, 2026

    The company holding all Bitcoin ETF coins is losing money, resurfacing questions about centralization

    February 21, 2026

    The Bitcoin CME gap will now close forever in May leaving a return to $84k hanging

    February 21, 2026

    Robinhood’s $221 million crypto revenue drop shows crypto winter isn’t on chain and retail already moved

    February 16, 2026

    Coinbase Board and CEO Brian Armstrong Face Shareholder Lawsuit

    March 6, 2026

    EtherMail adds email identity for AI agents

    March 6, 2026

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Security and Privacy»New ‘Chihuahua Stealer’ Targets Browser Data and Crypto Wallets
New ‘Chihuahua Stealer' Targets Browser Data and Crypto Wallets
Security and Privacy

New ‘Chihuahua Stealer’ Targets Browser Data and Crypto Wallets

September 10, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

A new strain of infostealer blending standard malware techniques with unusually advanced features has been detected.

First flagged by a Reddit user in April 2025, the malware, known as Chihuahua Stealer, was analyzed by G Data CyberDefense, which shared its findings in a May 13 report.

While appearing unsophisticated on the surface, this .NET infostealer employs advanced methods, including stealthy loading, scheduled task persistence and a multi-staged payload.

Multi-Stage PowerShell Script Infection

On April 9, a user on the r/antivirus subreddit shared how they were tricked into executing an obfuscated PowerShell script from a Google Drive document.

Upon investigation, G Data CyberDefense discovered that the PowerShell-based loader triggers a complex, multi-stage execution chain that leverages Base64 encoding, hex-string obfuscation and scheduled jobs to maintain persistence.

The loader is designed to be modular and stealthy, retrieving additional payloads from fallback command-and-control (C2) domains as needed.

The multi-stage chain involves the following steps:

  1. A lightweight launcher executes a Base64-encoded PowerShell string via iex, bypassing execution policies and hiding the payload from static analysis and signature-based detection
  2. The launcher decodes and reconstructs a heavily obfuscated hex payload by removing delimiters and converting hex to ASCII, dynamically assembling the next-stage script to evade static and sandbox analysis
  3. The script establishes persistence by scheduling a job that scans for infection markers (“*.normaldaki” files) and, if present, contacts a primary (and fallback) C2 server to retrieve and execute additional payloads based on received commands
  4. The persistent job obtains a .NET assembly from a remote domain, loads a Base64-obfuscated payload (the Chihuahua Stealer) from OneDrive and executes it in-memory via reflection before cleaning up visible traces (console and clipboard)
See also  #GartnerSec: Embrace Hacker Culture to Battle Cyber-Criminals

Chihuahua Stealer’s Execution, Encryption and Data Exfiltration

The stealer initiates execution with the DedMaxim() function, which prints transliterated Russian rap lyrics to the console with short pauses between each line. The G Data researchers believe this to be a signature, albeit serving no functional purpose.

After displaying the lyrics, the stealer executes its main logic in the PopilLina() function, where it gathers the machine name and disk serial number via Windows Management Instrumentation (WMI), then obfuscates and hashes them to generate a unique identifier for the infected system. This identifier is used to name the archive and folder that will store the exfiltrated data.

After generating a unique victim ID and preparing a staging directory, the malware begins extracting data by searching for browser and crypto wallet files in user directories.

It utilizes a function to scan dynamic paths (with %USERPROFILE% placeholders) for installed browsers, and then another function to systematically extract credentials, cookies, autofill data, browsing history, sessions, and payment information from each detected browser.

Additionally, it targets crypto wallet extensions by identifying and copying data from folders associated with known wallet extension IDs.

After extracting browser data and crypto wallet extension files, the malware gets the stolen information ready for encryption and exfiltration. It creates a plaintext file named Brutan.txt in the working directory, then compresses all stolen data into a “.chihuahua” archive. Immediately afterward, the archive is encrypted using AES-GCM.

Once the stolen data has been zipped and encrypted into a “.VZ” file, the malware attempts to exfiltrate it to an external server using a retry loop.

See also  FBI-Led Operation Duck Hunt Shuts Down QakBot Malware

The actual exfiltration happens in VseLegalno(). The function creates a WebClient instance and sets headers to mimic a binary file upload, then uploads the “.VZ” encrypted file to hxxps://flowers[.]hold-me-finger[.]xyz/index2[.]php.

Finally, the stealer wipes all evidence of its activity from the disk by using standard file and directory deletion commands.

G Data’s Mitigation Recommendations

G Data CyberDefense provided a list of recommendations to mitigate the Chihuahua Stealer threat:

  • Alert on frequent scheduled PowerShell jobs with suspicious or obfuscated commands
  • Hunt for unusual file extensions or marker files in directories like Recent or Temp
  • Detect Base64 decoding combined with .NET reflection (e.g., Assembly::Load()) in PowerShell logs
  • Flag uncommon AES-GCM usage via Windows CNG APIs, especially when tied to outbound HTTPS traffic
Browser Chihuahua Crypto Data Stealer Targets wallets
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Crypto leaked by South Korean tax officials stolen a second time

March 6, 2026

Reform UK tops donations with millions from Thailand-based crypto investor: Report

March 6, 2026

Crypto platform aims to let retail investors buy IPO shares at the same price as Wall Street insiders

March 6, 2026

Bitcoin Price Debate Ignites as Bull Trap Warning Clashes With On-Chain Data

March 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

VitaminAi Taps ALFΛ to Redefine Web3 Social Competition and On-Chain Gaming

October 30, 2025

Billionaire David Tepper Pours $411,000,000 Into Contrarian Asset After Dumping Exposure To Tech, Health and AI Stocks

January 3, 2026

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Coinbase Board and CEO Brian Armstrong Face Shareholder Lawsuit

March 6, 2026

EtherMail adds email identity for AI agents

March 6, 2026

SuperRare Liquid Editions: The Next Evolution of NFTs

March 6, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.