Malvertising campaign leads to PS1Bot, a multi-stage malware framework
A malware campaign utilizing malvertising has been distributing PS1Bot, a sophisticated multi-stage framework implemented in PowerShell and C#. PS1Bot features modular design, enabling information theft, keylogging, reconnaissance, and persistent system access. The malware minimizes artifacts and uses in-memory execution techniques for stealth. Active since early 2025, PS1Bot's information stealer targets cryptocurrency wallets and employs wordlists to identify files containing passwords and seed phrases. The campaign overlaps with previously reported Skitnet activities and uses similar C2 infrastructure. Delivery involves compressed archives with obfuscated scripts, leading to PowerShell modules for antivirus detection, screen capture, data theft, keylogging, and system information collection. Persistence is established through startup directory manipulation.
Pulse ID: 689bb3c9004eca543a36d5fc
Pulse Link: https://otx.alienvault.com/pulse/689bb3c9004eca543a36d5fc
Pulse Author: AlienVault
Created: 2025-08-12 21:36:09
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
