HomeSample Page

Sample Page Title


Pretend ‘One Battle After One other’ torrent hides malware in subtitles

A faux torrent for Leonardo DiCaprio’s ‘One Battle After One other’ hides malicious PowerShell malware loaders inside subtitle recordsdata that in the end infect gadgets with the Agent Tesla RAT malware.

The malicious torrent file was found by Bitdefender researchers whereas investigating a spike in detections associated to the film.

One Battle After One other is a extremely rated Paul Thomas Anderson film launched on September 26, 2025, starring Leonardo DiCaprio, Sean Penn, and Benicio del Toro.

Cybercriminals benefiting from curiosity round new motion pictures by importing malicious torrents is not something new, however Bitdefender notes this case stands out for its unusually advanced and stealthy an infection chain.

“It is unimaginable to estimate how many individuals downloaded the recordsdata, however we noticed that the supposed film had hundreds of seeders and leechers,” defined Bitdefender.

Launching malware from subtitles

The downloaded One Battle After One other film torrent used within the assaults incorporates numerous recordsdata, together with a film file (One Battle After One other.m2ts), two picture recordsdata (Picture.jpg, Cowl.jpg), a subtitles file (Part2.subtitles.srt), and a shortcut file (CD.lnk) that seems as a film launcher.

When the CD shortcut is executed, it launches Home windows instructions that extract and run a malicious PowerShell script embedded within the subtitle file between traces 100 and 103.

Malicious PowerShell script hidden in subtitles
Malicious PowerShell script hidden in subtitles

This PowerShell script will then extract quite a few AES-encrypted information blocks from the subtitles file once more to reconstruct 5 PowerShell scripts which can be dropped to ‘C:Customers<USER>AppDataLocalMicrosoftDiagnostics.’

Other encrypted PowerShell commands in the subtitles
Different encrypted PowerShell instructions within the subtitles
Supply: BleepingComputer

The extracted PowerShell scripts act as a malware dropper, performing the next actions on the host:

  • Stage 1 – Extracts the One Battle After One other.m2ts file as an archive utilizing any accessible extractor.
  • Stage 2 – Creates a hidden scheduled activity (RealtekDiagnostics) that runs RealtekCodec.bat
  • Stage 3 – Decodes embedded binary information from Picture.jpg and writes restored recordsdata to the Home windows Sound Diagnostics Cache listing.
  • Stage 4 – Ensures %LOCALAPPDATApercentPackagesMicrosoft.WindowsSoundDiagnosticsCache exists.
  • Stage 5 – Extracts Cowl.jpg contents into the Cache listing, together with batch recordsdata and PowerShell scripts.

The recordsdata extracted within the ultimate stage are used to verify whether or not Home windows Defender is energetic, set up Go, extract the ultimate payload (AgentTesla), and cargo it straight into reminiscence.

AgentTesla is a long-running (since 2014) Home windows RAT and knowledge stealer, generally used to steal browser, e mail, FTP, and VPN credentials, in addition to to seize screenshots.

Whereas Agent Tesla is just not new, it stays extensively used as a consequence of its reliability and ease of deployment.

Bitdefender has famous that in different film titles, for instance, ‘Mission: Not possible – The Ultimate Reckoning,’ it has noticed different households used, akin to Lumma Stealer.

Torrent recordsdata from nameless publishers usually include malware, so it is suggested that customers keep away from pirating new motion pictures solely for security.

Damaged IAM is not simply an IT drawback – the affect ripples throughout your complete enterprise.

This sensible information covers why conventional IAM practices fail to maintain up with trendy calls for, examples of what “good” IAM seems like, and a easy guidelines for constructing a scalable technique.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles