General
-
Target
LoserLol.exe
-
Size
16.8MB
-
Sample
240422-dc4hpaeh6s
-
MD5
98847e2ecce85bc90534bcadd322e68e
-
SHA1
86337da26d9bcd30bd63cad496148667163af459
-
SHA256
cb8d1eb1f130f80de079c6dd8b078434d32e64334781beb589dda4318c73ed7d
-
SHA512
405865135dd2a5c7f534a013c743dd2a01c0c44bfcce5de00ca79e1505a49a260774c12ecf8c5cda2372b237120a7ec203aca8d3eba7aa43d918575d3c4c4e3a
-
SSDEEP
393216:jQbr7M5liAdQuslSl9RoWOv+9fgQU/Ky39J7f:jQn7M5lndQu9borvSY9/T37
Behavioral task
behavioral1
Sample
LoserLol.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
LoserLol.exe
-
Size
16.8MB
-
MD5
98847e2ecce85bc90534bcadd322e68e
-
SHA1
86337da26d9bcd30bd63cad496148667163af459
-
SHA256
cb8d1eb1f130f80de079c6dd8b078434d32e64334781beb589dda4318c73ed7d
-
SHA512
405865135dd2a5c7f534a013c743dd2a01c0c44bfcce5de00ca79e1505a49a260774c12ecf8c5cda2372b237120a7ec203aca8d3eba7aa43d918575d3c4c4e3a
-
SSDEEP
393216:jQbr7M5liAdQuslSl9RoWOv+9fgQU/Ky39J7f:jQn7M5lndQu9borvSY9/T37
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-