General

  • Target

    LoserLol.exe

  • Size

    16.8MB

  • Sample

    240422-dc4hpaeh6s

  • MD5

    98847e2ecce85bc90534bcadd322e68e

  • SHA1

    86337da26d9bcd30bd63cad496148667163af459

  • SHA256

    cb8d1eb1f130f80de079c6dd8b078434d32e64334781beb589dda4318c73ed7d

  • SHA512

    405865135dd2a5c7f534a013c743dd2a01c0c44bfcce5de00ca79e1505a49a260774c12ecf8c5cda2372b237120a7ec203aca8d3eba7aa43d918575d3c4c4e3a

  • SSDEEP

    393216:jQbr7M5liAdQuslSl9RoWOv+9fgQU/Ky39J7f:jQn7M5lndQu9borvSY9/T37

Malware Config

Targets

    • Target

      LoserLol.exe

    • Size

      16.8MB

    • MD5

      98847e2ecce85bc90534bcadd322e68e

    • SHA1

      86337da26d9bcd30bd63cad496148667163af459

    • SHA256

      cb8d1eb1f130f80de079c6dd8b078434d32e64334781beb589dda4318c73ed7d

    • SHA512

      405865135dd2a5c7f534a013c743dd2a01c0c44bfcce5de00ca79e1505a49a260774c12ecf8c5cda2372b237120a7ec203aca8d3eba7aa43d918575d3c4c4e3a

    • SSDEEP

      393216:jQbr7M5liAdQuslSl9RoWOv+9fgQU/Ky39J7f:jQn7M5lndQu9borvSY9/T37

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks