Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools

Posted on July 22, 2025July 22, 2025 By CWS

A complicated new phishing marketing campaign has emerged, delivering the DeerStealer malware by way of weaponized .LNK shortcut information that exploit reliable Home windows binaries in a way referred to as “Dwelling off the Land” (LOLBin).

The malware masquerades as a reliable PDF doc named “Report.lnk” whereas covertly executing a fancy multi-stage assault chain that leverages mshta.exe, a reliable Microsoft HTML Utility host utility.

The assault represents a big evolution in malware supply mechanisms, using Microsoft’s personal instruments to bypass conventional safety measures.

The malicious .LNK file initiates a fastidiously orchestrated execution sequence that progresses by way of a number of system binaries earlier than in the end deploying the DeerStealer payload.

This strategy exploits the inherent belief that safety techniques place in reliable working system elements, making detection considerably more difficult.

LinkedIn analysts and researchers recognized this marketing campaign as significantly regarding because of its subtle evasion strategies and the abuse of the MITRE ATT&CK framework method T1218.005, which particularly covers the malicious use of mshta.exe.

The researchers famous that the assault’s reliance on dynamic path decision and obfuscated command execution represents a notable development in malware sophistication.

Execution Chain and An infection Mechanism

The DeerStealer an infection follows a exact five-stage execution chain: .lnk → mshta.exe → cmd.exe → PowerShell → DeerStealer.

The preliminary .LNK file covertly invokes mshta.exe to execute closely obfuscated scripts utilizing wildcard paths to evade signature-based detection techniques.

DeerStealer Delivered Through Obfuscated .LNK Utilizing LOLBin Abuse (Supply – LinkedIn)

The malware dynamically resolves the complete path to mshta.exe throughout the System32 listing, launching it with particular flags adopted by obfuscated Base64 strings.

To keep up stealth throughout execution, each logging and profiling capabilities are disabled, considerably decreasing forensic visibility.

The script employs a complicated character decoding mechanism the place characters are processed in pairs, transformed from hexadecimal to ASCII format, then reassembled into executable scripts by way of PowerShell’s IEX (Invoke-Expression) cmdlet.

This ensures the malicious logic stays hidden till runtime, successfully bypassing static evaluation instruments.

The ultimate payload supply entails dynamic URL decision from obfuscated arrays, simultaneous obtain of a decoy PDF doc to distract victims, and silent set up of the primary executable into the AppData listing.

The reliable PDF opens in Adobe Acrobat as a diversion tactic whereas the malware establishes persistence.

Key indicators of compromise embody the area tripplefury[.]com and SHA256 hashes fd5a2f9eed065c5767d5323b8dd928ef8724ea2edeba3e4c83e211edf9ff0160 and 8f49254064d534459b7ec60bf4e21f75284fbabfaea511268c478e15f1ed0db9.

Enhance detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:DeerStealer, Delivered, LNK, LOLBin, Malware, Tools, Weaponized

Post navigation

Previous Post: Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens
Next Post: Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT

Related Posts

Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks Cyber Security News
46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks Cyber Security News
Sendmarc appoints Rob Bowker as North American Region Lead Cyber Security News
Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials Cyber Security News
Threat Actors Using Fake Travel Websites to Infect Users’ PCs with XWorm Malware Cyber Security News
Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
  • SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month
  • TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
  • SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month
  • TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News