SPEAK WITH AN EXPERT

From Phishing to Exfiltration: A Deep Dive into PXA Stealer

Contributors: Niranjan Jayanand, Veena Sagar, Karthik Joseph, Archana Manoharan


Executive Summary

CyberProof MDR analysts and Threat Researchers have identified a significant surge in PXA Stealer activity targeting global financial institutions during Q1 2026. These campaigns primarily leverage phishing emails containing malicious URLs that trigger the download of compromised ZIP attachments. Threat actors have demonstrated high levels of adaptability, utilizing diverse lures ranging from curriculum vitae and Adobe Photoshop installers to tax forms and legal documentation. This opportunistic approach highlights the attackers’ ability to target a broad spectrum of victims. Following the 2025 takedowns of major infostealers such as Lumma, Rhadamanthys, and RedLine, CyberProof observes that PXA Stealer activity has filled the resulting vacuum, seeing an estimated growth of 8-10%.

This campaign investigated by CyberProof researchers is slightly different from the previous publicly reported research on PXA Stealers from August 2025. This article provides a detailed technical analysis of a PXA Stealer attack and its stages and a cluster using BOT_ID – “Verymuchxbot”, mapping out the entire kill chain from the initial phishing email to data exfiltration.

CyberProof researchers share this data publicly to inform the cybersecurity community, enable other organizations to defend against similar attacks, and contribute to the collective knowledge necessary to combat evolving cyber threats.

Technical Details

PXA Stealers help attackers steal browser data, passwords, crypto wallet information and more, and later pass them through Telegram channels. The kill chain reviewed looked very similar to the previously published research, but some differences became apparent to our research team after some inverstigation.

Flowchart illustrating a global malware attack chain targeting financial organizations, starting from a hidden malicious document and showing steps of decoding, extraction, and PXA Stealers payload delivery to a Windows system directory.

Fig. 1: Kill Chain of investigated PXA Stealer incident

During our investigation into an incident, we saw that a user was tricked into downloading a zip archive file by the name of Pumaproject.zip from downloadtheproject [.] xyz.

Fig. 2: User tricked to download malicious archive

When the user executed Document.docx.exe the next stage of attack is launched, unpacking python interpreter, python libraries and scripts.

Screenshot of a security alert showing that a document .docx .exe file created the process cmd.exe—often targeted by PXA Stealers in global financial organizations—with details on related processes, event time, alert name, and process tree.

Fig. 3: This in turn executed inter.cmd from the hidden directory

A Windows File Explorer window shows the file

Fig. 4: Microsoft document used for side loading next stage payload. This kicks off the next stage of the multi-stage attack

Below we can see the Word document launching a benign document called Document.docx, and a series of LOLBins and file operations by the attacker.

A screenshot showing a log of file creation events and downloads, listing file names, timestamps, and partial file paths on a computer system—potentially useful for investigating PXA Stealers targeting global financial organizations.

Fig. 5: PXA Stealer component files extracted followed by a hidden folder creation by the name of ‘Dots’

File inside the hidden directory which was named “Dots” is shown below:

A command prompt window displays a directory listing of five files, including Document.docx and Shodan.pdf—files that could attract the attention of global financial organizations targeted by PXA Stealers. Each file’s size and timestamp are shown.

Fig. 6: Creation of files inside “Dots” folder

Some TTPs that remain the same except change in the hidden folder name are:

1.) Certutil is used to decode a file from the “Dots“ folder into a new encrypted zip archive that is deceptively named with a PDF file extension, Shodan.pdf.

A computer screen shows an activity log for document handling in global financial organizations, including actions such as viewing, updating, and archiving, along with user details and timestamps.

Fig. 7: Certutil.exe deobfuscates content from Shodan.pdf

2.) Legitimate WinRar executable in the “Dots“ folder renamed picture.png is used to unpack the archive.

A computer screen shows a list of emails with timestamps, subjects, and actions in one panel, and file details for a selected email attachment in another—highlighting potential PXA Stealers threats targeting global financial organizations.

Fig. 8: Winrar disguised as picture.png unpacks the archive

3.) The second archive contains a portable Windows Python interpreter, several Python libraries, and a malicious Python script. The Python interpreter is renamed to svchost.exe and launches a heavily obfuscated Python script, again disguised as images.png, followed by the $BOT_ID argument.

Picture.png was unpacked with the password “shodan2201” and stored to a new directory “C:\Users\Public\WindowsSecure”.

A screenshot shows process details for

Fig. 9: Usage of password “shodan2201” to extract other files

File explorer window showing the WindowsSecure folder with files like python310.dll, svchost.exe, and vcruntime140.dll; an arrow points to svchost.exe labeled

Fig. 10: Dropping Python Interpreter disguised as svchost.exe

File name:  svchost.exe

SHA256: a8c0b8b5a892198aef71fa68d0a0eb88d3e8d5c541ad6a1ecf5baa0bc95fc403

Screenshot of a security event log showing details of a cmd.exe process launching svchost.exe via a Python portable executable, with file paths and command lines highlighted—a tactic often leveraged by PXA Stealers targeting global financial organizations.

Fig. 11 : The Python interpreter is renamed

As shown above, the Python interpreter is renamed to svchost.exe and launches a heavily obfuscated Python script again – with a reference to likely $BOT_ID value “Verymuchxbot” or “Ken1”. The PXA Stealer payload is then finally injected into browsers to target user credentials and crypto wallets, and to intercecpt targeted data when specific websites are visited.

Alert window showing a security event: WINWORD.EXE monitoring user keystrokes using hooking, flagged as keylogging on March 10, 2026. Event details and file paths suggest potential PXA Stealers activity targeting global financial organizations.

Fig. 12: PXA Stealer hooks to steal user data

The stolen data is later exfiltrated through Telegram by the PXA Stealer as shown below.

A screenshot of a security event log showing process activity, including a svchost.exe connection via TCP port 443—crucial for cybersecurity in global financial organizations—with detailed process and network information displayed on the right.

Fig. 13 : Data exfiltration through Telegram (t.me)

The PXA Stealer achieves persistence by adding a value registry entry.

Recommendations

Security teams should be vigilant for the specific indicators and behaviors detailed above to detect and mitigate this attack.
Here’s what to look for:

Initial Access and Delivery

  • Malicious Attachments: Watch for emails with suspicious URLs and RAR/zip attachments, especially those with suspicious file names related to invoices, bills, payments, etc.
  • VBE/VBS/JS File Execution: Monitor for the execution of VBScript (.vbs), VBE (.vbe), or JavaScript (.js) files particularly if they are launched from temporary folders or Outlook’s content folder.

Execution and Persistence

  • Process Injection: Review EDR alerts related to process injection which is typical in the case of infostealers.
  • Suspicious Outbound Connections: Block outbound connections to suspicious TLDs like .shop, .xyz, info, .net etc. These are typically seen in infostealer campaigns. We advise you to check for the source file context that leads to such outbound connections.

Data Exfiltration

  • Credential Access: Review traffic to third party cloud sources or applications like Telegram, Signal, etc.
  • Stay Ahead: Keep your CTI feeds and hunting queries updated to stay ahead of commodity malware attacks.

Threat Hunting Query

Screenshot of a code query filtering device events for processes using "certutil -decode" with PDF files—relevant for global financial organizations—displaying timestamp, device, account, file, and process details.
Screenshot of a data query and results in a security monitoring tool, showing process execution events with columns for timestamp, account name, file name, and related command lines—critical for global financial organizations tracking PXA Stealers activity.

Fig. 14: Hunting query

Indicators of Compromise

  • File name: picture.png
  • SHA256:23b122deea347dbe2407c1542c1cc6caaafca537eb5d1950a4ed7c8a69395dbb
  • File Name: Document.docx
  • SHA256:d30a4d0249b5417af02a4e7ffb5b456efd8cd5eb8da6532329ae071f643e5079
  • FileName:c2r64.dll
  • SHA256: 10955134b4e8dc41b2a116ab41d17b0ef0985bea99bdc5f0e5a11a07728905ec
  • FileName:Pumaproject.zip
  • SHA256: 100a7674ece92dae0dc0bfde15dfb524939a8dd0c295ff2e232895a07e21342f
  • File Name: Shodan.pdf
  • SHA256: 8de1c5a66deab8bd4f59b2801a66f503f087345ccb0598c5ca8185f1edb2092b
  • FileName: Inter.cmd

Additional Indicators of Compromise

  • SHA256: e1f6c80aae41feed9acfc62f1e1d83077ce6fda4bed56ffb448fe132a1c97afe
  • 2255735d78b9ca0a20cbd2834876f4d1
  • 7d68cfe4d7a83608490e6c3c8291ec9b
  • 79471f93e15e04e6b7879a09de79d35b
  • 0a5b50ca9beb5b740fdae5d783d5616d
  • 61a163ae3cac1255c852a37c675edd5d
  • 696c710f62e3a7f7c618c4733d67cc13
  • 47b4c3dd3bc58037de31f3ee218d4ea1
  • 6b6ee7e492e4c573381393dedbfec94d
  • 386981b3cd77df33b60cd9b9d93a7812
  • edee9e57699eea7371234acd40a34cac
  • a534676c0dcf8d63eb1f7cbcd0bd5f35
  • 0f1939d88e38cc825dfe5c50926344d6
  • 6f5a040c83d490e30ea9b242c962d179
  • 57ee3e3e7b106727b77ce98bf80c0e1b
  • 3324c1c827428a212e2c9898d082037e
  • 4b14ef9a1a69b3d39a8dda04e1d119bf
  • 0c19f07cec233481e8efcf722f2b29fd
  • 5991a68b994e76d48212b098ac599560
  • fd50bc23272f3704762218ba43ce068b
  • 00d68afd8a75ce8c194ab3bb4c64c152
  • d240282856829133ec8f5ddd712fb49c
  • 88528f1c4df15e1d4c92d71fe1223761
  • 5d7d338c4cdd706a01de1ec32a08c5f4
  • 690dcef7d7e265096010b276649fb529
  • fd5fd153bded23ffac1a4dd2bbb38c78
  • d85b44735555d96c6c763c4d466e074f

IPs

  • 146.112.56.140
  • 151.243.109.125
  • https://downloadtheproject.xyz/Pumaproject.zip
  • https://downloadtheproject.xyz/Puma-job.zip
  • https://downloadtheproject.xyz/Marketing-Puma!.zip

Conclusion

This in-depth analysis of the PXA Stealer attack methodology provides a critical look into the evolving tactics of cybercriminals. By detailing the malware’s sophisticated techniques – from its initial delivery via malicious RAR attachments to its use of DLL sideloading, injection , LOLBin abuse and data exfiltration – we hope to equip organizations with the knowledge needed to strengthen their defenses.

Sharing these insights, including the Indicators of Compromise and hunting queries listed below, is a vital step in fostering a more resilient and collaborative cybersecurity community, enabling us all to better anticipate and neutralize future threats.