Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

Mastercard joins the blockchain security push — why it matters now

April 24, 2026

Npm Supply Chain Attack Uses Worm-Like Propagation

April 24, 2026

Bitcoin Recovery May Not Arrive Until October, Scaramucci Says

April 24, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    India pushes digital rupee through welfare pilots as BRICS CBDC plan takes shape

    April 24, 2026

    Bitcoin’s Quantum Problem Is Really A Governance Crisis In Disguise: UTXO

    April 24, 2026

    Eric Trump’s American Bitcoin adds 11,298 ASIC miners – ABTC stock surges 8%

    April 24, 2026

    US Military Tests Bitcoin Node for Cybersecurity Research

    April 24, 2026

    Ethereum Near Key Zone After 36% Gain

    April 24, 2026

    Bitmine Stakes 61,232 ETH Worth $142M

    April 22, 2026

    Ethereum Targets Lower Range As Resistance Zone Comes Into Play

    April 22, 2026

    Ethereum Price Rises, But On-Chain Data Signals Weak Demand —What’s Next for ETH?

    April 21, 2026

    Bitcoin Recovery May Not Arrive Until October, Scaramucci Says

    April 24, 2026

    Dogecoin Keeps Getting Capped At This Parallel Channel Level, Analyst Says

    April 24, 2026

    What’s Happening Between ETH And The Financial Systems?

    April 24, 2026

    Could Ripple XRP Power Cross-Border Payments? Russia’s Early Tests Suggest Potential

    April 23, 2026

    Meme Coin Market Faces Imbalance as Supply Rises, Demand Falls

    April 4, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    Mastercard joins the blockchain security push — why it matters now

    April 24, 2026

    Npm Supply Chain Attack Uses Worm-Like Propagation

    April 24, 2026

    Bitcoin Recovery May Not Arrive Until October, Scaramucci Says

    April 24, 2026

    KuCoin Launches KuCard in Australia, Expanding Real-World Crypto Payments

    April 24, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    Mastercard joins the blockchain security push — why it matters now

    April 24, 2026

    WalletConnect Integrates with TradFi-Focused Chain Canton Network

    April 24, 2026

    Base Tests Azul Upgrade With Multiproofs Ahead of Planned Mainnet Launch

    April 24, 2026

    Pyth Network to determine outcomes in Kalshi’s commodities expansion

    April 24, 2026

    Npm Supply Chain Attack Uses Worm-Like Propagation

    April 24, 2026

    How crypto futures markets are feeding ‘scam coin’ insider pump and dumps

    April 22, 2026

    North Korean Blamed for $290m KelpDAO Crypto Heist

    April 21, 2026

    Chainalysis Flags Critical Blind Spot in DeFi Security as $292M Exploit Bypasses Burn Verification

    April 21, 2026

    Mastercard joins the blockchain security push — why it matters now

    April 24, 2026

    Npm Supply Chain Attack Uses Worm-Like Propagation

    April 24, 2026

    Bitcoin Recovery May Not Arrive Until October, Scaramucci Says

    April 24, 2026

    KuCoin Launches KuCard in Australia, Expanding Real-World Crypto Payments

    April 24, 2026
  • Web 3
    1. Gaming
    2. View All

    KuCoin Launches KuCard in Australia, Expanding Real-World Crypto Payments

    April 24, 2026

    REAL and RWA Inc. Partner to Advance Tokenized Asset Infrastructure Amid Growing RWA Demand

    April 24, 2026

    Zach Lowe: Celtics’ offense struggles since Tatum’s return, Luka Doncic’s historic scoring season, and LeBron’s pivotal role in Lakers’ surprise playoff success

    April 24, 2026

    GameFi is effectively dead as 93% of projects collapse

    April 24, 2026

    Mastercard joins the blockchain security push — why it matters now

    April 24, 2026

    Npm Supply Chain Attack Uses Worm-Like Propagation

    April 24, 2026

    Bitcoin Recovery May Not Arrive Until October, Scaramucci Says

    April 24, 2026

    KuCoin Launches KuCard in Australia, Expanding Real-World Crypto Payments

    April 24, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    Justin Sun sues Trump-linked World Liberty over disputed token freeze and governance proposal

    April 24, 2026

    Donald Trump Announces Ceasefire with Iran Extended!

    April 24, 2026

    Tron’s Justin Sun sues Trump-linked World Liberty Financial over frozen assets

    April 24, 2026

    New York sues Coinbase, Gemini over prediction market offerings

    April 24, 2026

    Cardano development teams wants almost $50 million for Bitcoin DeFi and Vision 2030

    April 24, 2026

    Oil tanker attacked after falling for crypto scam granting fake Strait of Hormuz safe passage

    April 21, 2026

    Six years after “DeFi Summer” is the sun already setting on the decentralized finance revolution?

    April 20, 2026

    Bitcoin network activity just hit an 8-year low — has Wall Street replaced retail in the market?

    April 19, 2026

    Mastercard joins the blockchain security push — why it matters now

    April 24, 2026

    Npm Supply Chain Attack Uses Worm-Like Propagation

    April 24, 2026

    Bitcoin Recovery May Not Arrive Until October, Scaramucci Says

    April 24, 2026

    KuCoin Launches KuCard in Australia, Expanding Real-World Crypto Payments

    April 24, 2026
  • Analysis

    Is $2 the Next Target?

    April 24, 2026

    SPK Price Explodes After Breakout, But Overbought Signals Flash Warning

    April 23, 2026

    US Bankers association push for 60 day pause to stop stablecoin rules going live

    April 23, 2026

    STABLE Price Jumps 15% After CEO Spotlight, But Is This Rally Sustainable?

    April 23, 2026

    ZEC Price Prediction: Zcash Retests Key Level

    April 23, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What’s on the Ethereum Roadmap: Glamsterdam, Hegota and Beyond

    March 30, 2026

    What Is Bluesky? The Decentralized Social Media Rival to Elon Musk’s X

    March 27, 2026

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    Over 80% of Bitcoin ETF assets hit Coinbase custody choke point with $74B at risk

    April 13, 2026

    FTX begins $2.2B payout. Can Bitcoin absorb another liquidity test?

    March 31, 2026

    BlinkEx investment platform infrastructure – matching, risk controls, reliability

    March 21, 2026

    Over $2B in “lost” Bitcoin to hit markets this month creating sell pressure within fragile $67k–$74k range

    March 20, 2026

    Mastercard joins the blockchain security push — why it matters now

    April 24, 2026

    Npm Supply Chain Attack Uses Worm-Like Propagation

    April 24, 2026

    Bitcoin Recovery May Not Arrive Until October, Scaramucci Says

    April 24, 2026

    KuCoin Launches KuCard in Australia, Expanding Real-World Crypto Payments

    April 24, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Security and Privacy»New ‘Chihuahua Stealer’ Targets Browser Data and Crypto Wallets
New ‘Chihuahua Stealer' Targets Browser Data and Crypto Wallets
Security and Privacy

New ‘Chihuahua Stealer’ Targets Browser Data and Crypto Wallets

September 10, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

A new strain of infostealer blending standard malware techniques with unusually advanced features has been detected.

First flagged by a Reddit user in April 2025, the malware, known as Chihuahua Stealer, was analyzed by G Data CyberDefense, which shared its findings in a May 13 report.

While appearing unsophisticated on the surface, this .NET infostealer employs advanced methods, including stealthy loading, scheduled task persistence and a multi-staged payload.

Multi-Stage PowerShell Script Infection

On April 9, a user on the r/antivirus subreddit shared how they were tricked into executing an obfuscated PowerShell script from a Google Drive document.

Upon investigation, G Data CyberDefense discovered that the PowerShell-based loader triggers a complex, multi-stage execution chain that leverages Base64 encoding, hex-string obfuscation and scheduled jobs to maintain persistence.

The loader is designed to be modular and stealthy, retrieving additional payloads from fallback command-and-control (C2) domains as needed.

The multi-stage chain involves the following steps:

  1. A lightweight launcher executes a Base64-encoded PowerShell string via iex, bypassing execution policies and hiding the payload from static analysis and signature-based detection
  2. The launcher decodes and reconstructs a heavily obfuscated hex payload by removing delimiters and converting hex to ASCII, dynamically assembling the next-stage script to evade static and sandbox analysis
  3. The script establishes persistence by scheduling a job that scans for infection markers (“*.normaldaki” files) and, if present, contacts a primary (and fallback) C2 server to retrieve and execute additional payloads based on received commands
  4. The persistent job obtains a .NET assembly from a remote domain, loads a Base64-obfuscated payload (the Chihuahua Stealer) from OneDrive and executes it in-memory via reflection before cleaning up visible traces (console and clipboard)
See also  Suspected North Korean Attack Drains $2m from CoinStats Wallets

Chihuahua Stealer’s Execution, Encryption and Data Exfiltration

The stealer initiates execution with the DedMaxim() function, which prints transliterated Russian rap lyrics to the console with short pauses between each line. The G Data researchers believe this to be a signature, albeit serving no functional purpose.

After displaying the lyrics, the stealer executes its main logic in the PopilLina() function, where it gathers the machine name and disk serial number via Windows Management Instrumentation (WMI), then obfuscates and hashes them to generate a unique identifier for the infected system. This identifier is used to name the archive and folder that will store the exfiltrated data.

After generating a unique victim ID and preparing a staging directory, the malware begins extracting data by searching for browser and crypto wallet files in user directories.

It utilizes a function to scan dynamic paths (with %USERPROFILE% placeholders) for installed browsers, and then another function to systematically extract credentials, cookies, autofill data, browsing history, sessions, and payment information from each detected browser.

Additionally, it targets crypto wallet extensions by identifying and copying data from folders associated with known wallet extension IDs.

After extracting browser data and crypto wallet extension files, the malware gets the stolen information ready for encryption and exfiltration. It creates a plaintext file named Brutan.txt in the working directory, then compresses all stolen data into a “.chihuahua” archive. Immediately afterward, the archive is encrypted using AES-GCM.

Once the stolen data has been zipped and encrypted into a “.VZ” file, the malware attempts to exfiltrate it to an external server using a retry loop.

See also  Senator Cynthia Lummis Reviews Crypto Bill Ahead of Mark Up

The actual exfiltration happens in VseLegalno(). The function creates a WebClient instance and sets headers to mimic a binary file upload, then uploads the “.VZ” encrypted file to hxxps://flowers[.]hold-me-finger[.]xyz/index2[.]php.

Finally, the stealer wipes all evidence of its activity from the disk by using standard file and directory deletion commands.

G Data’s Mitigation Recommendations

G Data CyberDefense provided a list of recommendations to mitigate the Chihuahua Stealer threat:

  • Alert on frequent scheduled PowerShell jobs with suspicious or obfuscated commands
  • Hunt for unusual file extensions or marker files in directories like Recent or Temp
  • Detect Base64 decoding combined with .NET reflection (e.g., Assembly::Load()) in PowerShell logs
  • Flag uncommon AES-GCM usage via Windows CNG APIs, especially when tied to outbound HTTPS traffic
Browser Chihuahua Crypto Data Stealer Targets wallets
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Npm Supply Chain Attack Uses Worm-Like Propagation

April 24, 2026

KuCoin Launches KuCard in Australia, Expanding Real-World Crypto Payments

April 24, 2026

Crypto Veterans Flip Bullish on Bitcoin As BTC Trades at $78,000 – Here Are Their Price Targets

April 24, 2026

Explosive Class Action Alleges False Advertising and Market Manipulation in Crypto AI Project

April 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

EACC head promotes AI, blockchain tech to African anti-corruption commissions

February 9, 2026

Investors Find FXGuys a Better Long-Term Option Than Toncoin and Cardano

October 1, 2025

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Mastercard joins the blockchain security push — why it matters now

April 24, 2026

Npm Supply Chain Attack Uses Worm-Like Propagation

April 24, 2026

Bitcoin Recovery May Not Arrive Until October, Scaramucci Says

April 24, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.