Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools

Posted on July 22, 2025July 22, 2025 By CWS

A complicated new phishing marketing campaign has emerged, delivering the DeerStealer malware by way of weaponized .LNK shortcut information that exploit reliable Home windows binaries in a way referred to as “Dwelling off the Land” (LOLBin).

The malware masquerades as a reliable PDF doc named “Report.lnk” whereas covertly executing a fancy multi-stage assault chain that leverages mshta.exe, a reliable Microsoft HTML Utility host utility.

The assault represents a big evolution in malware supply mechanisms, using Microsoft’s personal instruments to bypass conventional safety measures.

The malicious .LNK file initiates a fastidiously orchestrated execution sequence that progresses by way of a number of system binaries earlier than in the end deploying the DeerStealer payload.

This strategy exploits the inherent belief that safety techniques place in reliable working system elements, making detection considerably more difficult.

LinkedIn analysts and researchers recognized this marketing campaign as significantly regarding because of its subtle evasion strategies and the abuse of the MITRE ATT&CK framework method T1218.005, which particularly covers the malicious use of mshta.exe.

The researchers famous that the assault’s reliance on dynamic path decision and obfuscated command execution represents a notable development in malware sophistication.

Execution Chain and An infection Mechanism

The DeerStealer an infection follows a exact five-stage execution chain: .lnk → mshta.exe → cmd.exe → PowerShell → DeerStealer.

The preliminary .LNK file covertly invokes mshta.exe to execute closely obfuscated scripts utilizing wildcard paths to evade signature-based detection techniques.

DeerStealer Delivered Through Obfuscated .LNK Utilizing LOLBin Abuse (Supply – LinkedIn)

The malware dynamically resolves the complete path to mshta.exe throughout the System32 listing, launching it with particular flags adopted by obfuscated Base64 strings.

To keep up stealth throughout execution, each logging and profiling capabilities are disabled, considerably decreasing forensic visibility.

The script employs a complicated character decoding mechanism the place characters are processed in pairs, transformed from hexadecimal to ASCII format, then reassembled into executable scripts by way of PowerShell’s IEX (Invoke-Expression) cmdlet.

This ensures the malicious logic stays hidden till runtime, successfully bypassing static evaluation instruments.

The ultimate payload supply entails dynamic URL decision from obfuscated arrays, simultaneous obtain of a decoy PDF doc to distract victims, and silent set up of the primary executable into the AppData listing.

The reliable PDF opens in Adobe Acrobat as a diversion tactic whereas the malware establishes persistence.

Key indicators of compromise embody the area tripplefury[.]com and SHA256 hashes fd5a2f9eed065c5767d5323b8dd928ef8724ea2edeba3e4c83e211edf9ff0160 and 8f49254064d534459b7ec60bf4e21f75284fbabfaea511268c478e15f1ed0db9.

Enhance detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:DeerStealer, Delivered, LNK, LOLBin, Malware, Tools, Weaponized

Post navigation

Previous Post: Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens
Next Post: Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT

Related Posts

Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites Cyber Security News
Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News
System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools Cyber Security News
VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Dell Says Data Leaked by Hackers Is Fake
  • Vulnerabilities Expose Helmholz Industrial Routers to Hacking
  • Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access
  • Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution
  • Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Dell Says Data Leaked by Hackers Is Fake
  • Vulnerabilities Expose Helmholz Industrial Routers to Hacking
  • Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access
  • Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution
  • Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News