General

  • Target

    LoserLol.zip

  • Size

    16.6MB

  • Sample

    240410-hkwj9sfc23

  • MD5

    5c69f6176370eb3340a33d07e39a832e

  • SHA1

    06abf2ce6fdd297c0dccca4d4c27b9b554f0f462

  • SHA256

    ab5e44469e16de6aa9f624799b7364da39f4110e0205326e845017d0fdb0a2e5

  • SHA512

    6023691f3e6102e56c738146e14c3ce5cecf99dc2aa6a8e7223a08ea45396b88f411eb12d41374d9683d7dab85b2ed2cc2f859afb6466d8ae9a71b7af6c0b1c4

  • SSDEEP

    393216:OT6xX42ARgTaBWIyIEyY7wes/Aa7rJUjjFQkH:OT6p42agTKLJER7QAaVWj5H

Malware Config

Targets

    • Target

      LoserLol.exe

    • Size

      16.8MB

    • MD5

      98847e2ecce85bc90534bcadd322e68e

    • SHA1

      86337da26d9bcd30bd63cad496148667163af459

    • SHA256

      cb8d1eb1f130f80de079c6dd8b078434d32e64334781beb589dda4318c73ed7d

    • SHA512

      405865135dd2a5c7f534a013c743dd2a01c0c44bfcce5de00ca79e1505a49a260774c12ecf8c5cda2372b237120a7ec203aca8d3eba7aa43d918575d3c4c4e3a

    • SSDEEP

      393216:jQbr7M5liAdQuslSl9RoWOv+9fgQU/Ky39J7f:jQn7M5lndQu9borvSY9/T37

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks