Skip to Content
logologo
AI Incident Database
Open TwitterOpen RSS FeedOpen FacebookOpen LinkedInOpen GitHub
Open Menu
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse

Report 5246

Associated Incidents

Incident 10808 Report
Noodlophile Stealer Reportedly Distributed Through Allegedly Fraudulent AI Content Platforms

Loading...
Fake AI video generators drop new Noodlophile infostealer malware
bleepingcomputer.com · 2025

Fake AI-powered video generation tools are being used to distribute a new information-stealing malware family called 'Noodlophile,' under the guise of generated media content.

The websites use enticing names like the "Dream Machine" and are advertised on high-visibility groups on Facebook, posing as advanced AI tools that generate videos based on uploaded user files. 

Although the use of AI tools to deliver malware isn't a new concept and has been adopted by experienced cybercriminals, the discovery of the latest campaign by Morphisec introduces a new infostealer into the mix.

According to Morphisec, Noodlophile is being sold on dark web forums, often bundled with "Get Cookie + Pass" services, so it's a new malware-as-a-service operation linked to Vietnamese-speaking operators.

Multi-stage infection chain

Once the victim visits the malicious website and uploads their files, they receive a ZIP archive that is supposed to contain an AI-generated video.

Instead, the ZIP contains a deceptively named executable (Video Dream MachineAI.mp4.exe), and a hidden folder with various files needed for the subsequent stages. If a Windows user has file extensions disabled (never do that), that at a quick glance, would look like an MP4 video file.

"The file Video Dream MachineAI.mp4.exe is a 32-bit C++ application signed using a certificate created via Winauth," explains Morphisec.

"Despite its misleading name (suggesting an .mp4 video), this binary is actually a repurposed version of CapCut, a legitimate video editing tool (version 445.0). This deceptive naming and certificate help it evade user suspicion and some security solutions."

Double-clicking on the fake MP4 will execute a series of executables that eventually launch a batch script (Document.docx/install.bat).

The script uses the legitimate Windows tool 'certutil.exe' to decode and extract a base64-encoded password-protected RAR archive posing as a PDF document. At the same time, it also adds a new Registry key for persistence.

Next, the script executes 'srchost.exe,' which runs an obfuscated Python script (randomuser2025.txt) fetched from a hardcoded remote server address, eventually executing the Noodlophile Stealer in memory.

If Avast is detected on the compromised system, PE hollowing is used to inject the payload into RegAsm.exe. Otherwise, shellcode injection is used for in-memory execution.

Noodlophile is a new information stealer malware that targets data stored on web browsers like account credentials, session cookies, tokens, and cryptocurrency wallet files.

"Noodlophile Stealer represents a new addition to the malware ecosystem. Previously undocumented in public malware trackers or reports, this stealer combines browser credential theft, wallet exfiltration, and optional remote access deployment," explains the Morphisec researchers.

Stolen data is exfiltrated via a Telegram bot, which serves as a covert command and control (C2) server, giving attackers real-time access to stolen information.

In some cases, Noodlophile is bundled with XWorm, a remote access trojan, giving the attackers elevated data theft capabilities that go well beyond the passive stealing facilitated by the info-stealer.

The best way to protect from malware is to avoid downloading and executing files from unknown websites.

Always verify file extensions before opening, and scan all downloaded files on an up-to-date AV tool before executing.

Read the Source

Research

  • Defining an “AI Incident”
  • Defining an “AI Incident Response”
  • Database Roadmap
  • Related Work
  • Download Complete Database

Project and Community

  • About
  • Contact and Follow
  • Apps and Summaries
  • Editor’s Guide

Incidents

  • All Incidents in List Form
  • Flagged Incidents
  • Submission Queue
  • Classifications View
  • Taxonomies

2024 - AI Incident Database

  • Terms of use
  • Privacy Policy
  • Open twitterOpen githubOpen rssOpen facebookOpen linkedin
  • e1b50cd