Researchers at Bitdefender have uncovered a malware campaign that uses the allure of a pirated movie to infect Windows users with the Agent Tesla information stealer. The attackers are distributing a fake torrent file for a non-existent Leonardo DiCaprio movie titled "One Battle After Another." The infection process is highly convoluted, designed to bypass security software and user suspicion. It involves multiple stages of scripts and decryption, culminating in a memory-only execution of Agent Tesla, a potent trojan known for its ability to steal credentials, keystrokes, and other sensitive data.
The attack preys on users searching for pirated content on torrent websites. The downloaded torrent appears suspicious, containing a large number of files rather than a single video file. The core of the attack is a malicious .lnk shortcut file disguised as a movie launcher. When the user clicks this shortcut, it triggers a complex chain of events designed to download and execute the final malware payload without being detected.
The multi-stage attack chain is designed for stealth and evasion:
Initial Execution (T1204.002 - Malicious File): The user clicks a malicious .lnk file within the torrent download.
Scripting and Obfuscation (T1059.001 - PowerShell): The shortcut file executes a PowerShell command. This command reads and executes hidden batch commands embedded within other files in the torrent, such as subtitle files (.srt). This is a form of steganography (T1027.003 - Steganography).
Multi-Layered Execution: The initial scripts lead to further layers of PowerShell execution. These scripts download image archives which contain AES-encrypted payloads. The decryption key is passed through the chain of scripts.
Persistence (T1547.001 - Registry Run Keys / Startup Folder): To ensure it survives a reboot, the malware creates a scheduled task disguised as a legitimate "Realtek audio diagnostic task."
Final Payload (Fileless Execution): The final payload is the Agent Tesla executable, which is decrypted and loaded directly into memory. This fileless technique means no malicious executable is written to the disk, making it much harder for traditional file-based antivirus scanners to detect.
Once active, Agent Tesla is a powerful information stealer. It can:
A successful infection can lead to the compromise of numerous online accounts, including email, banking, and social media, resulting in financial loss and identity theft.
No specific IOCs such as file hashes or C2 domains were provided in the source reports.
.srt or .txt..lnk files from untrusted locations like a 'Downloads' folder should be considered suspicious.cmd.exe or powershell.exe are spawned by unexpected applications..lnk) or script (.bat, .vbs).Educate users about the significant risks of downloading pirated content and how to identify suspicious files like .lnk shortcuts pretending to be media files.
Use application control policies to restrict the execution of scripting languages like PowerShell for standard users, disrupting the attack chain.
Mapped D3FEND Techniques:
Deploy an EDR solution that can detect and block malicious behaviors, such as a .lnk file launching PowerShell to execute commands from a subtitle file.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats