LOWBALL

Malware updated 5 months ago (2024-05-04T20:18:11.473Z)
Download STIX
Preview STIX
LOWBALL is a sophisticated malware payload that was utilized by a China-based cyber threat group, often referred to as "admin@338". This advanced persistent threat (APT) group used LOWBALL in their operations targeting media organizations in Hong Kong and Taiwan. The malware's first stage allows the group to gather information from victims before delivering a second-stage malware known as BUBBLEWRAP to confirmed targets. LOWBALL is unique in its abuse of Dropbox cloud storage service for command and control (CnC), making it difficult for network defenders to detect its activity. The execution process of LOWBALL involves the malware calling back to a Dropbox account controlled by the attackers. Upon receiving the call-back, the attackers create a file named “[COMPUTER_NAME]_upload.bat” containing commands to be executed on the compromised computer. This method allows the attackers to update the compromised host with new versions of the LOWBALL malware, maintaining control over the infected system. The malware was delivered via spear-phishing emails containing malicious documents exploiting an older vulnerability in Microsoft Office (CVE-2012-0158). In conclusion, LOWBALL represents a significant evolution in malware design and deployment, utilizing cloud storage services to mask its activities and maintain persistence within infected systems. Despite the innovative use of cloud services for CnC, the initial infection vector remains traditional - exploiting known vulnerabilities via spear-phishing emails. The ongoing use of LOWBALL by APT groups underscores the importance of regular system updates and robust cybersecurity measures to mitigate such threats.
Description last updated: 2024-05-04T20:04:00.321Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
Alias DescriptionAssociation TypeVotes
The CVE-2012-0158 Vulnerability is associated with LOWBALL. CVE-2012-0158 is a software vulnerability that was first exploited in 2012, resulting from a flaw in the design or implementation of Microsoft Windows Common Controls ActiveX Control. This vulnerability was primarily leveraged through parsing Rich-text-format (.rtf) files and allowed malicious actorUnspecified
2
Source Document References
Information about the LOWBALL Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more