General
-
Target
LoserLol.zip
-
Size
16.6MB
-
Sample
240319-k17zcaff59
-
MD5
5c69f6176370eb3340a33d07e39a832e
-
SHA1
06abf2ce6fdd297c0dccca4d4c27b9b554f0f462
-
SHA256
ab5e44469e16de6aa9f624799b7364da39f4110e0205326e845017d0fdb0a2e5
-
SHA512
6023691f3e6102e56c738146e14c3ce5cecf99dc2aa6a8e7223a08ea45396b88f411eb12d41374d9683d7dab85b2ed2cc2f859afb6466d8ae9a71b7af6c0b1c4
-
SSDEEP
393216:OT6xX42ARgTaBWIyIEyY7wes/Aa7rJUjjFQkH:OT6p42agTKLJER7QAaVWj5H
Malware Config
Targets
-
-
Target
LoserLol.exe
-
Size
16.8MB
-
MD5
98847e2ecce85bc90534bcadd322e68e
-
SHA1
86337da26d9bcd30bd63cad496148667163af459
-
SHA256
cb8d1eb1f130f80de079c6dd8b078434d32e64334781beb589dda4318c73ed7d
-
SHA512
405865135dd2a5c7f534a013c743dd2a01c0c44bfcce5de00ca79e1505a49a260774c12ecf8c5cda2372b237120a7ec203aca8d3eba7aa43d918575d3c4c4e3a
-
SSDEEP
393216:jQbr7M5liAdQuslSl9RoWOv+9fgQU/Ky39J7f:jQn7M5lndQu9borvSY9/T37
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-