Back to reports

The VICTOR Connection: One .NET Injector Developer, Two Stealer Families, and a Romanian Beef Breeders Association

The same ALTERNATE.dll PDB path — C:\Users\VICTOR\Documents\CryptoObfuscator_Output — appears in both a Phemedrone campaign targeting Hungary and a Formbook campaign targeting Italy. Same developer, different customers.

PublishedApril 21, 2026

Table of Contents

  1. TL;DR
  2. What This Report Adds to the Public Record
  3. The Compromised Host: Romanian Beef Breeders Association
  4. Kill Chain
  5. Stage 1: JavaScript Dropper — Hungarian-Language Lure
  6. Stage 2: AES-256-CBC Encrypted PowerShell
  7. Stage 3: ALTERNATE.dll — The VICTOR Injector
  8. Stage 4: Phemedrone Stealer
  9. The VICTOR Link: Formbook Uses the Same Injector
  10. Infrastructure
  11. IOC Table
  12. MITRE ATT&CK Mapping
  13. Recommendations

TL;DR

A compromised WordPress site belonging to the Romanian Association of Beef Cattle Breeders (ACBCR) at acbcr[.]ro is hosting a multi-stage Phemedrone Stealer delivery chain targeting Hungarian-speaking victims. The kill chain runs from a Hungarian-language JavaScript dropper through AES-256-CBC encrypted PowerShell, into a .NET process-hollowing injector called ALTERNATE.dll, and finally into Phemedrone Stealer disguised as svchost.exe.

The key finding is ALTERNATE.dll itself. Its PDB path — C:\Users\VICTOR\Documents\CryptoObfuscator_Output\ALTERNATE.pdb — is identical to the injector used in a Formbook campaign we documented on April 20 that used Italian shipping lures and catbox[.]moe for payload hosting. The developer behind the username VICTOR is building .NET process-hollowing injectors for multiple stealer families — operating as either a shared-tool developer or a loader-as-a-service provider.

Credit: @smica83 for the initial tip that led to this investigation.


What This Report Adds to the Public Record

  • Links ALTERNATE.dll across two separate stealer campaigns (Phemedrone and Formbook) via identical PDB paths, connecting a single developer ("VICTOR") to both operations.
  • Documents the full Phemedrone delivery chain from compromised Romanian livestock association website through AES+XOR layered decryption to process-hollowed stealer execution.
  • Identifies the compromised WordPress site (acbcr[.]ro) with directory listing enabled, exposed admin username, and active payload hosting — actionable for defenders and the site owner.

The Compromised Host: Romanian Beef Breeders Association

The payload hosting site is acbcr[.]ro — the official website of the Asociația Crescătorilor de Bovine pentru Carne din România (Romanian Association of Beef Cattle Breeders), directed by Costel Țaran.

The WordPress installation shows multiple signs of compromise and poor security hygiene:

IndicatorDetail
Domainacbcr[.]ro
IP188.241.74[.]68
ASNAS5606 — Hostico Romania
CMSWordPress (version undetermined)
Admin useradmin_acbcr (exposed via wp-json/wp/v2/users)
Directory listingEnabled on /wp-content/uploads/ and /wp-includes/
Payload path/wp-content/update.ps1 (3.4 MB encrypted PowerShell)

The exposed user enumeration endpoint and enabled directory listing suggest this site has been poorly maintained — making it an easy target for automated WordPress exploitation scanners. The attackers placed their encrypted PowerShell payload at a path (update.ps1) designed to blend in with legitimate WordPress update files.


Kill Chain

[1] JS Dropper (Hungarian lure)
    Rendelés_aqualing_2026_22445146200001.js
         │
         ▼
[2] AES-256-CBC Encrypted PowerShell
    acbcr[.]ro/wp-content/update.ps1 (3.4 MB)
    Key: wgJ/fzXmOQvFo6Edg9U0SoQr6rEdvegLcUT35OSmDQ0=
    IV:  YzVJsAmkpoAPJnVvW5n1dA==
         │
         ▼
[3] XOR-Decrypted .NET Assembly
    Key: "vkSecretKey765"
         │
         ▼
[4] ALTERNATE.dll (.NET Loader)
    PDB: C:\Users\VICTOR\Documents\CryptoObfuscator_Output\ALTERNATE.pdb
    Class: ALTERNATE.EXECUTE → Method: LAUNCH
    Process hollows aspnet_compiler.exe
         │
         ▼
[5] Phemedrone Stealer
    750 KB .NET, Costura/Fody packed
    Disguised as svchost.exe
    Embedded shellcode handle: ~draGon~

Stage 1: JavaScript Dropper — Hungarian-Language Lure

The initial access vector is a JavaScript file named:

Rendelés_aqualing_2026_22445146200001.js

"Rendelés" is Hungarian for "Order" — this is a purchase-order themed social engineering lure targeting Hungarian-speaking victims. The filename references "aqualing," likely impersonating a legitimate Hungarian business to add credibility.

The JS dropper's job is simple: download the encrypted PowerShell payload from the compromised ACBCR site and execute it.


Stage 2: AES-256-CBC Encrypted PowerShell

The dropper fetches a 3.4 MB file from:

hxxps://acbcr[.]ro/wp-content/update.ps1

Despite the .ps1 extension, this file is AES-256-CBC encrypted. The decryption parameters are hardcoded in the dropper:

ParameterValue
AlgorithmAES-256-CBC
Key (Base64)wgJ/fzXmOQvFo6Edg9U0SoQr6rEdvegLcUT35OSmDQ0=
IV (Base64)YzVJsAmkpoAPJnVvW5n1dA==

After AES decryption, the resulting PowerShell script contains an embedded .NET assembly that is XOR-encrypted with the key vkSecretKey765. The two-layer encryption (AES for the transport layer, XOR for the payload) is a common pattern in commodity loader chains — the AES layer defeats network-level inspection, while the XOR layer adds a second gate that requires execution context to pass through.


Stage 3: ALTERNATE.dll — The VICTOR Injector

After XOR decryption, the PowerShell script reflectively loads a .NET assembly: ALTERNATE.dll.

This is the most significant artifact in the chain. Key properties:

PropertyValue
SHA256c8a0077a21f2ba22ec5a6d956b012b794c8b5a70e5ccd05adcff786020850791
PDB pathC:\Users\VICTOR\Documents\CryptoObfuscator_Output\ALTERNATE.pdb
ObfuscatorCryptoObfuscator
NamespaceALTERNATE
ClassALTERNATE.EXECUTE
Entry methodLAUNCH
TechniqueProcess hollowing into aspnet_compiler.exe

The PDB path reveals two things:

  1. The developer's Windows username is VICTOR — a consistent artifact that ties this binary to other campaigns.
  2. The binary was processed through CryptoObfuscator — a commercial .NET obfuscation tool — before compilation.

ALTERNATE.dll's sole function is process hollowing: it spawns a suspended instance of aspnet_compiler.exe (a legitimate .NET Framework utility), hollows out its memory, injects the final payload, and resumes execution. Using aspnet_compiler.exe as the hollowed target is a deliberate choice — it's a signed Microsoft binary that exists on most Windows systems with .NET Framework installed, and its execution is less likely to trigger behavioral alerts than more commonly abused LOLBins.


Stage 4: Phemedrone Stealer

The final payload is Phemedrone Stealer — a well-documented .NET information stealer.

PropertyValue
SHA256c916f289ff9a05d74d72f28582ff03690d415fe64a4195b4f47195fe286c6d2d
Size~750 KB
PackerCostura/Fody (embedded dependency bundler)
DisguiseNamed svchost.exe at runtime
Shellcode handle~draGon~
Platform.NET

Phemedrone targets browser credentials, cryptocurrency wallets, Discord tokens, Telegram sessions, and Steam accounts. The Costura/Fody packing merges all dependencies into a single executable, simplifying deployment and reducing the file's footprint on disk.

The embedded shellcode handle ~draGon~ may serve as an operator tag or campaign identifier — worth tracking as a pivot for related Phemedrone deployments.


This is where the investigation gets interesting.

On April 20, 2026, we documented a Formbook campaign that used an Italian-language shipping lure:

  • Lure filename: Referenced "Bozza dei documenti di spedizione" (Italian: "Draft shipping documents")
  • Payload host: catbox[.]moe (a public file-sharing service frequently abused for malware staging)
  • Injector: ALTERNATE.dll — identical PDB path: C:\Users\VICTOR\Documents\CryptoObfuscator_Output\ALTERNATE.pdb

Two separate campaigns. Two different stealer families. Two different targeting languages (Hungarian vs. Italian). Two different payload hosting strategies (compromised WordPress vs. public file-sharing). But the same .NET process-hollowing injector, built by the same developer.

AttributePhemedrone CampaignFormbook Campaign
Lure languageHungarianItalian
Lure themePurchase orderShipping documents
Payload hostacbcr[.]ro (compromised WP)catbox[.]moe (file sharing)
InjectorALTERNATE.dllALTERNATE.dll
PDB pathC:\Users\VICTOR\...C:\Users\VICTOR\...
Final payloadPhemedrone StealerFormbook
Hollowed processaspnet_compiler.exeaspnet_compiler.exe

This pattern suggests one of two operational models:

  1. VICTOR is a loader-as-a-service developer — building and selling the ALTERNATE.dll injector to multiple threat actors who deploy their own choice of stealer. This is the more likely scenario given the diversity of final payloads and targeting.

  2. VICTOR is a single operator running multi-regional campaigns with different stealer families optimized for different target demographics.

Either way, the ALTERNATE.dll PDB path is now a reliable hunting pivot. Any future sample with C:\Users\VICTOR\Documents\CryptoObfuscator_Output\ALTERNATE.pdb in its debug directory should be flagged and traced.


Infrastructure

Payload Hosting

HostRoleDetails
acbcr[.]roEncrypted PS1 stagingWordPress, 188.241.74[.]68, AS5606 Hostico RO
/wp-content/update.ps1Payload path3.4 MB AES-encrypted PowerShell

WordPress Exposure

The compromised site leaks significant information:

  • User enumeration: wp-json/wp/v2/users exposes admin_acbcr
  • Directory listing: Both /wp-content/uploads/ and /wp-includes/ have indexing enabled
  • No hardening: Default WordPress API endpoints are fully accessible

IOC Table

File Hashes

ArtifactSHA256Notes
update.ps1c023166a028773efc229e5d4a052fd768d356f7674bc57de91169b9c47bcae55AES-encrypted PowerShell, 3.4 MB
ALTERNATE.dllc8a0077a21f2ba22ec5a6d956b012b794c8b5a70e5ccd05adcff786020850791.NET injector, PDB: VICTOR
Phemedrone Stealerc916f289ff9a05d74d72f28582ff03690d415fe64a4195b4f47195fe286c6d2d750 KB, Costura/Fody packed

Network Indicators

IndicatorTypeContext
acbcr[.]roDomainCompromised WordPress — payload hosting
188.241.74[.]68IPv4Hosting IP for acbcr[.]ro
/wp-content/update.ps1URI pathEncrypted PowerShell payload

Encryption Keys

ParameterValue
AES-256-CBC KeywgJ/fzXmOQvFo6Edg9U0SoQr6rEdvegLcUT35OSmDQ0=
AES-256-CBC IVYzVJsAmkpoAPJnVvW5n1dA==
XOR KeyvkSecretKey765

Developer Artifacts

ArtifactValue
PDB pathC:\Users\VICTOR\Documents\CryptoObfuscator_Output\ALTERNATE.pdb
Windows usernameVICTOR
Shellcode handle~draGon~

MITRE ATT&CK Mapping

TacticTechniqueIDImplementation
Initial AccessPhishing: Spearphishing AttachmentT1566.001Hungarian-language JS dropper
ExecutionCommand and Scripting Interpreter: JavaScriptT1059.007.js file executes download chain
ExecutionCommand and Scripting Interpreter: PowerShellT1059.001Decrypted PS1 loads .NET assembly
Defense EvasionObfuscated Files or Information: Encrypted/Encoded FileT1027.013AES-256-CBC + XOR layered encryption
Defense EvasionProcess Injection: Process HollowingT1055.012ALTERNATE.dll hollows aspnet_compiler.exe
Defense EvasionMasquerading: Match Legitimate NameT1036.005Phemedrone disguised as svchost.exe
Defense EvasionObfuscated Files or Information: Software PackingT1027.002Costura/Fody packing
Resource DevelopmentCompromise Infrastructure: Web ServicesT1584.006Compromised WordPress site for payload hosting
Resource DevelopmentStage Capabilities: Upload MalwareT1608.001update.ps1 staged on compromised site
Credential AccessCredentials from Password Stores: Credentials from Web BrowsersT1555.003Phemedrone browser credential theft
CollectionData from Local SystemT1005Wallet, Discord, Telegram, Steam data

Recommendations

For defenders:

  • Hunt for ALTERNATE.pdb or the PDB path C:\Users\VICTOR\Documents\CryptoObfuscator_Output\ across your .NET binary telemetry.
  • Block 188.241.74[.]68 and monitor for connections to acbcr[.]ro.
  • Flag any aspnet_compiler.exe execution that is not part of a legitimate .NET build pipeline.
  • Monitor for PowerShell scripts performing AES decryption followed by reflective .NET assembly loading.

For the ACBCR site owner:

  • The WordPress installation at acbcr[.]ro is actively compromised and hosting malware. The /wp-content/update.ps1 file should be removed immediately.
  • Disable directory listing, restrict the wp-json/wp/v2/users endpoint, rotate the admin_acbcr credentials, and audit for webshells.

Credit to @smica83 for the tip that kicked off this investigation.

Published by Breakglass Intelligence — April 20, 2026

Share