Back to reports
mediumStealer

That Password Manager You Downloaded Is Actually a $3,000/Month Infostealer

InvestigatedMarch 16, 2026PublishedMarch 16, 2026
stealersocial-engineeringc2apt

A WiX Burn installer calling itself "Antonomasia" by "Cyme" bundles a fully functional copy of Active@ Password Changer alongside DeerStealer -- a MaaS infostealer that will drain your browser credentials, crypto wallets, and messaging sessions before you finish clicking through the setup wizard. The social engineering is deliberate: users searching for password management tools are statistically likely to have something worth stealing. The threat actor knows this.

Sample 04bb4867d35e77e8e391f3829cf07a542a73815fc8be975a7733790d6e04243c was first observed on 2026-03-15. Two C2 domains were active at time of analysis. The PE compile timestamp claims 2017. It's forged.


How the Bundle Works

The outer executable is a legitimate WiX Burn bootstrapper -- the same installer framework used by Microsoft Visual Studio and other trusted software. The .wixburn PE section at the header and an embedded CAB archive at file offset 0x71200 are the structural tells. Inside that CAB: 15 files. Only three are malicious. The rest are genuine Qt5 libraries, MSVC runtimes, and a StarBurn SDK DLL, all present to inflate the "clean" file ratio and make superficial AV analysis return a low threat score.

Bundle Identity:
  Display Name : Antonomasia
  Publisher    : Cyme
  Version      : 5.3.10.0
  Bundle GUID  : {039b68bb-ce50-4ecf-919a-0063a775d991}
  UpgradeCode  : {9CA7841D-0AFC-47D7-9FF9-95EEF9DB0AE1}
  MSI Product  : {5931BD7A-1314-4267-8D1E-1A70FBB0464F}

The malicious trio:

FileSHA256Role
Bichromate.dll58a6b1fe90145f8ae431d05952d1751e705ae46a81be1c2257f5e1e0ce0292c7Download engine (masquerades as Adobe CCMNative.dll)
jrid704f5f01487ca3340454240868515de1a43a1b65e5b4a97a74ab409c8441f82AES-CBC encrypted DeerStealer payload (entropy 7.96)
yodpxub1a5991a30e9d339cbb0143d4bd134509cf4effc7fead7f4f7dcc059990efd669XOR-obfuscated C2 configuration

The decoy -- ActiveISO.exe (SHA256: 588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd) -- is a genuine, unmodified copy of Active@ Password Changer by LSoft Technologies. It installs, it works, and it keeps the victim distracted.


The Kill Chain

Stage 1 -- Extraction. The WiX Burn engine extracts the CAB to %TEMP%\{GUID}\ and registers "Antonomasia" in Add/Remove Programs. To Windows, it looks like a normal software installation.

Stage 2 -- Decoy. Active@ Password Changer installs visibly. The user sees a real product doing real things. No suspicion.

Stage 3 -- Bichromate loads. Bichromate.dll is dropped and loaded under the export name CCMNative.dll -- Adobe Creative Cloud Manager's native component. This is DLL masquerading. The DLL itself is a weaponized copy of Adobe's Generic Download Engine (GDE v7.0.4.0). Debug strings confirm the provenance:

"GDE Version is 7.0.4.0"
"Adobe_Download_.%s"
"Going to download the file at %s/%s"

Repurposing a legitimate Adobe download engine as your malware loader is a bold choice. It comes pre-built with WinHTTP integration, chunked transfer support, and RSA signature verification -- everything you need for a robust C2 communication channel.

Stage 4 -- Config decryption. Bichromate reads yodpxub and decrypts it with a 32-byte XOR key:

Key (hex): 3c58786d0e72043135730f6f036743312e532220316e216f64691d673d7a027438

The result is a CCMConfig.xml file containing the C2 download URL. The first 38 bytes after decryption: <?xml version="1.0" encoding="utf-8"?>.

Stage 5 -- C2 beacon. Bichromate phones home over HTTPS to Cloudflare-proxied domains. It may fetch an updated payload or proceed with the embedded one.

Stage 6 -- Fileless execution. The jri blob is decrypted in memory using CryptoPP's AES-CBC implementation. The resulting DeerStealer binary executes without ever touching disk in plaintext form. File-based AV never sees it.

Stage 7 -- Everything gets stolen. DeerStealer harvests:

  • Credentials from 50+ browsers (passwords, cookies, autofill, credit cards)
  • 800+ browser extensions (crypto wallets, authenticators, password managers)
  • 14+ cryptocurrency desktop wallets (Electrum, Exodus, Atomic, etc.)
  • Messaging sessions (Discord tokens, Telegram tdata, WhatsApp, Signal)
  • VPN/FTP configs (OpenVPN, WinSCP, FileZilla)
  • System screenshots, clipboard contents, installed software inventory

It also starts a hidden VNC server running at 30 FPS and a live keylogger. Everything you type after infection is captured.

Stage 8 -- Persistence. Three mechanisms:

  • Registry run key: HKCU\...\Run value AppVTemplate (installed via AppVTemplate.msi)
  • Scheduled tasks: zceWriter, dyApp, Pluginsecurity_dbg

Stage 9 -- Exfiltration. Stolen data stages in local SQLite databases (ribs_collection and ribs_payload tables), then ships out as XOR-encrypted HTTPS POSTs and AES-encrypted ZIP archives through Cloudflare's CDN via a "Gasket" proxy layer.


Infrastructure and Attribution

All active C2 infrastructure sits behind Cloudflare, which means the resolved IPs are Cloudflare Anycast addresses. Blocking them would break half the internet. Domain-based DNS blocking is the only effective network mitigation.

C2 Domains

DomainStatusResolved IPsNotes
telluricaphelion[.]comACTIVE172.67.213.91, 104.21.69.210Cloudflare CDN
loadinnnhr[.]todayACTIVE104.21.34.173, 172.67.163.79Cloudflare CDN
nacreousoculus[.]proOFFLINE (SERVFAIL)--Rotated out
ncloud-servers[.]shopOFFLINE (NXDOMAIN)--Rotated out
watchlist-verizon[.]comUnknown--Associated DeerStealer C2
365-drive[.]comUnknown--Associated DeerStealer C2

The domain naming pattern -- high-entropy compound words like "telluricaphelion" and "nacreousoculus" -- is manually crafted to avoid keyword blocklists while remaining pronounceable. Two domains already rotated offline during the analysis window, indicating active infrastructure management.

DeerStealer is a MaaS platform sold by @LuciferXfiles on Telegram-based cybercrime forums. Pricing runs $200 to $3,000/month depending on tier. This specific bundle was likely deployed by an affiliate -- the lure construction choices (WiX format, "Cyme" publisher name, "Antonomasia" branding, password tool decoy) are operational decisions made at the affiliate level, not dictated by the malware kit.

Distribution vector: almost certainly malvertising. The Rugmi/DeerStealer ecosystem is known for purchasing Google Ads targeting users searching for password managers and productivity tools. You search for a password tool, you click an ad, you get an infostealer.


Indicators of Compromise

Malicious File Hashes

FilenameSHA256
executable.exe / psyche.exe (dropper)04bb4867d35e77e8e391f3829cf07a542a73815fc8be975a7733790d6e04243c
Bichromate.dll (CCMNative.dll)58a6b1fe90145f8ae431d05952d1751e705ae46a81be1c2257f5e1e0ce0292c7
jri (encrypted DeerStealer)d704f5f01487ca3340454240868515de1a43a1b65e5b4a97a74ab409c8441f82
yodpxub (C2 config)1a5991a30e9d339cbb0143d4bd134509cf4effc7fead7f4f7dcc059990efd669

Additional hashes for the dropper:

  • MD5: 73e9ab1674c64f040da642b6a4690356
  • SHA1: e5a508bf8a7170cbacd6e6ab0259073a2a07b3cf

Legitimate Component Hashes (for allowlisting)

FilenameSHA256
ActiveISO.exe (decoy)588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd
msvcp140.dll72fe4598f0b75d31ce2dc621e8ef161338c6450bb017cd06895745690603729e
Qt5Core.dllf7bddcd19a740e179827a99c23cc045d6f4ab8d5b6699592b1a1e8fcb6ddc22f
Qt5Gui.dllca8334b2e63bc01f0749afeb9e87943c29882131efe58608ea25732961b2df34
Qt5Network.dlld992aaeb21cb567113126c2912cf75e892c8e3ead5d50147a11abe704b9e2e2b
Qt5PrintSupport.dll7d91d3d341dbba568e2d19382e9d58a42a0d78064c3ad7adfe3c7bb14742c2b1
Qt5Widgets.dll4266918226c680789d49cf2407a7fec012b0ed872adafb84c7719e645f9b2e6d
StarBurn.dllc040a25377028b0c28db81a012de786c803a0e9d6f87ce460335a621d31f5340
vcruntime140.dlld66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
vcruntime140_1.dll1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e
BootstrapperApplicationData.xmlaf5ec3654463a5a657fb60184a7e26dc863a860dbe58930fa874fddd97ccce27

Network Indicators

DomainTypeStatusAction
telluricaphelion[.]comC2ACTIVEBlock at DNS immediately
loadinnnhr[.]todayC2ACTIVEBlock at DNS immediately
nacreousoculus[.]proC2OFFLINEMonitor for reactivation
ncloud-servers[.]shopC2OFFLINEMonitor for reactivation
watchlist-verizon[.]comC2UnknownPreventive block
365-drive[.]comC2UnknownPreventive block

IP Addresses (Low Confidence -- Cloudflare Shared Infrastructure)

IPASNDomain
172.67.213.91AS13335 (Cloudflare)telluricaphelion[.]com
104.21.69.210AS13335 (Cloudflare)telluricaphelion[.]com
104.21.34.173AS13335 (Cloudflare)loadinnnhr[.]today
172.67.163.79AS13335 (Cloudflare)loadinnnhr[.]today

Do not block these IPs. They are shared Cloudflare Anycast addresses. Use DNS-layer blocking only.

File System Artifacts

PathDescription
%TEMP%\{GUID}\Bichromate.dllDropped download engine
%TEMP%\{GUID}\CCMNative.dllMasqueraded DLL name
%TEMP%\{GUID}\yodpxubObfuscated C2 config
%TEMP%\{GUID}\jriAES-encrypted payload blob
%TEMP%\{GUID}\ActiveISO.exeDecoy application
%APPDATA%\AppVTemplate\Likely DeerStealer working directory

Registry Indicators

KeyValueData
HKCU\Software\Microsoft\Windows\CurrentVersion\RunAppVTemplatePath to DeerStealer
HKLM\...\Uninstall\{039b68bb-ce50-4ecf-919a-0063a775d991}DisplayNameAntonomasia
HKLM\...\Uninstall\{039b68bb-ce50-4ecf-919a-0063a775d991}PublisherCyme

Scheduled Tasks

Task NamePurpose
zceWriterDeerStealer persistence
dyAppDeerStealer persistence
Pluginsecurity_dbgDeerStealer persistence

Bundle GUIDs

TypeValue
Bundle GUID{039b68bb-ce50-4ecf-919a-0063a775d991}
UpgradeCode{9CA7841D-0AFC-47D7-9FF9-95EEF9DB0AE1}
MSI ProductCode{5931BD7A-1314-4267-8D1E-1A70FBB0464F}

Cryptographic Artifacts

TypeValuePurpose
XOR Key (hex)3c58786d0e72043135730f6f036743312e532220316e216f64691d673d7a027438yodpxub decryption

MITRE ATT&CK Mapping

IDTacticTechniqueContext
T1204.002Initial AccessUser Execution: Malicious FileVictim runs the WiX installer
T1036.005Defense EvasionMasquerading: Match Legitimate Name"Antonomasia" by "Cyme" + Active@ Password Changer decoy
T1574.002Defense EvasionHijack Execution Flow: DLL Side-LoadingBichromate.dll exported as CCMNative.dll (Adobe component)
T1027Defense EvasionObfuscated Files or InformationXOR-encrypted config, AES-encrypted payload
T1140Defense EvasionDeobfuscate/Decode Files or InformationIn-memory decryption via CryptoPP
T1218.007Defense EvasionSystem Binary Proxy Execution: MsiexecAppVTemplate.msi invoked by WiX
T1059ExecutionCommand and Scripting InterpreterDeerStealer payload execution post-decryption
T1547.001PersistenceRegistry Run KeysHKCU Run key "AppVTemplate"
T1053.005PersistenceScheduled TaskzceWriter, dyApp, Pluginsecurity_dbg
T1555.003Credential AccessCredentials from Password Stores: Web Browsers50+ browsers targeted
T1552.001Credential AccessUnsecured Credentials: Credentials In FilesVPN/FTP config file theft
T1083DiscoveryFile and Directory DiscoverySystem enumeration
T1082DiscoverySystem Information DiscoveryOS, hardware, software inventory
T1005CollectionData from Local SystemDocuments, credentials, wallet files
T1056.001CollectionInput Capture: KeyloggingLive keylogger
T1071.001Command and ControlApplication Layer Protocol: Web ProtocolsHTTPS C2 via Cloudflare
T1573.001Command and ControlEncrypted Channel: Symmetric CryptographyXOR + AES encrypted C2 traffic
T1041ExfiltrationExfiltration Over C2 ChannelHTTPS POST with encrypted archives

Detection Priorities

If you find any of these in your environment, assume full credential compromise:

  1. DNS queries to telluricaphelion[.]com or loadinnnhr[.]today
  2. Scheduled tasks named zceWriter, dyApp, or Pluginsecurity_dbg
  3. Registry value AppVTemplate under HKCU\...\Run
  4. Add/Remove Programs entry for "Antonomasia" (GUID {039b68bb-ce50-4ecf-919a-0063a775d991})
  5. Files named yodpxub, jri, Bichromate.dll, or CCMNative.dll in temp directories

If DeerStealer executed on a host, treat every stored credential, session token, and crypto wallet on that machine as burned. The hidden VNC module means the attacker was watching the screen in real time. Rotate everything.


Investigation: executable-04bb4867 | Sample: 04bb4867d35e77e8e391f3829cf07a542a73815fc8be975a7733790d6e04243c | TLP:WHITE

Share