Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Daolpu (Infostealer) – Malware

January 30, 2025
Reading Time: 4 mins read
in Malware
Daolpu (Infostealer) – Malware

Daolpu

Type of Malware

Infostealer

Date of Initial Activity

2024

Motivation

Data Theft

Attack Vectors

Phishing

Targeted Systems

Windows

Type of information Stolen

Login Credentials
Corporte Data

Overview

The Daolpu Infostealer malware has emerged as a significant threat in the cybersecurity landscape, particularly highlighted by its discovery on July 24, 2024. Exploiting vulnerabilities during a recent CrowdStrike outage, this sophisticated piece of malware employs a weaponized Microsoft Word document to deliver its malicious payload. The Daolpu Infostealer demonstrates how cybercriminals can leverage ongoing security incidents to craft targeted phishing campaigns, capitalizing on the urgency and confusion that often accompany such events. This malware is designed to harvest sensitive information from infected systems, marking a troubling advancement in the capabilities of cyber adversaries. At its core, Daolpu utilizes macro-based attacks, a technique that has persisted due to its effectiveness. By embedding malicious code within Office documents, attackers can exploit users’ trust and manipulate them into enabling macros, which then triggers the execution of the malware. The Daolpu Infostealer’s operational method illustrates a calculated approach, where the attackers not only take advantage of current vulnerabilities but also create a façade of legitimacy, making the weaponized documents appear as urgent solutions to ongoing security issues. This tactic not only increases the likelihood of successful infection but also highlights the ongoing challenges organizations face in maintaining robust security protocols. Once deployed, the Daolpu malware systematically gathers sensitive information from various applications and browsers, targeting credentials and personal data that could lead to identity theft or financial fraud. The malware’s design allows it to perform extensive data exfiltration efficiently, often without raising alarms. As such, the rise of Daolpu serves as a cautionary tale, urging organizations to enhance their cybersecurity measures and educate users about the potential risks associated with opening unsolicited documents and enabling macros. The Daolpu Infostealer exemplifies the evolving landscape of cyber threats, necessitating a proactive and informed approach to cybersecurity.

Targets

Individuals Information

How they operate

Infection Vector: Phishing and Macro Execution
The primary delivery mechanism for Daolpu is a malicious Word document, typically spread through phishing emails. The document contains macros, which are small scripts designed to automate tasks within Microsoft Office applications. When a victim opens the document and enables macros—a step often overlooked due to user ignorance or urgency—the macro executes automatically, triggering the malware’s payload without further user interaction. This execution process leverages the macro scripting capabilities of Word, taking advantage of the common practice of enabling macros for legitimate documents. Once the macro is executed, it initiates a download sequence for the Daolpu payload, which is hosted on an attacker-controlled server. The malware is delivered as a DLL file, which integrates with the infected system’s processes. The absence of sophisticated obfuscation techniques suggests that Daolpu was developed quickly, indicating a focused attack strategy that capitalizes on the chaotic situation following the CrowdStrike incident.
Data Collection Mechanisms
Upon execution, Daolpu’s primary objective is to gather sensitive information from the compromised machine. The malware employs credential dumping techniques to extract saved passwords and sensitive data from popular web browsers, including Google Chrome, Mozilla Firefox, and Microsoft Edge. Notably, the inclusion of the Coc Coc Browser—widely used in Vietnam—highlights a potential targeting of specific regional entities. In addition to browser credentials, Daolpu systematically searches the local file system for documents that match specific file extensions, such as .doc, .docx, .xls, .xlsx, .pdf, .txt, .ppt, and .pptx. This targeted search allows the malware to compile a comprehensive dataset of potentially sensitive information, ranging from personal identification data to proprietary corporate documents.
Exfiltration and Command and Control
After collecting the desired data, Daolpu exfiltrates this information back to the attacker’s command and control (C2) server. This process occurs over HTTP channels, using multipart POST requests to transmit the stolen data. Notably, the lack of encryption in this transmission underscores the malware’s hurried development, which may have prioritized speed over security. The C2 server, hosted by Linode LLC, facilitates a one-way communication channel, where data flows from the infected host to the attacker without receiving any commands or updates in return. The exfiltrated information includes a consolidated file containing all harvested credentials and sensitive data, allowing attackers to use this information for malicious purposes, such as identity theft or financial fraud. The malware also captures the victim’s MAC address to uniquely identify the compromised system, ensuring the attackers can track and manage multiple infected devices.
Conclusion
The Daolpu Infostealer represents a sophisticated yet rapidly deployed malware threat that exploits user behavior and system vulnerabilities. By leveraging phishing tactics, malicious macros, and targeted data collection techniques, Daolpu demonstrates the ongoing evolution of cyber threats in today’s digital landscape. Understanding the operational mechanics of such malware is crucial for organizations and individuals to bolster their defenses against similar attacks. As cybercriminals continue to refine their strategies, proactive measures—including user education, robust email filtering, and advanced threat detection solutions—are essential to mitigate the risk of falling victim to such threats.

MITRE Tactics and Techniques

Initial Access:
Phishing (T1566): Daolpu Infostealer is spread via phishing campaigns, using weaponized Word documents to trick users into enabling macros. User Execution (T1203): The malware relies on users enabling macros to execute the malicious payload when they open the document.
Execution:
Scripting (T1064): The macro script within the Word document executes the malware upon document opening.
Collection:
Credential Dumping (T1003): Daolpu collects credentials from web browsers like Firefox, Chrome, and Edge. Data from Local System (T1005): The malware searches for sensitive documents on the infected machine, targeting specific file types (.doc, .pdf, etc.).
Exfiltration:
Exfiltration Over Web Service (T1041): The stolen data is sent to the attacker’s command and control (C2) server using HTTP POST requests. Automated Exfiltration (T1041): Data is exfiltrated without further user interaction, automatically transferring the stolen information.
Command and Control:
Web Service (T1102): The malware communicates with a C2 server hosted on a cloud provider. Ingress Tool Transfer (T1105): The malware may download additional payloads or tools from the C2 server.  
References:
  • Daolpu Infostealer: Full analysis of the latest malware exploited post CrowdStrike outage
Tags: CrowdStrikeDaolpuGoogle ChromeInfostealersMalwareMicrosoft EdgeMicrosoft WordMozilla FirefoxPhishingVulnerabilities
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Google Removes 352 ‘IconAds’ Fraud Apps

Malicious Firefox Add Ons Steal Crypto Keys

Browser Cache Attack Bypasses Web Security

PDFs Deliver QR Codes in Callback Scams

Critical Sudo Flaws Expose Linux Systems

Unkillable Mac Malware From North Korea

Subscribe to our newsletter

    Latest Incidents

    Tech Incubator IdeaLab Discloses Data Breach

    Brazil’s CIEE One Exposes 248,000 Records

    McLaughlin & Stern Discloses Data Breach

    Cyberattack Hits Medtech Firm Surmodics

    Rhysida Ransomware Hits German Charity WHH

    Hacker Accesses Max Financial’s User Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial