09-01-2025, 01:08 PM
![[Image: LOR-Logger-v2.png]](https://blackhattool.com/wp-content/uploads/2025/07/LOR-Logger-v2.png)
- Enhanced credential theft (banking logins, credit cards, crypto wallets)
- Advanced evasion techniques (anti-VM, anti-sandbox, code obfuscation)
- Modular plugin system (allowing attackers to add new features)
- Web injects
- Form grabbing
- Credit card harvesting
- Cryptocurrency theft
- Records keystrokes
- Takes screenshots
- Webcam hijacking
- Polymorphic code – Changes its signature to avoid AV detection.
- Process injection – Runs inside legitimate processes (e.g., explorer.exe).
- Virtual Machine (VM) evasion – Detects sandbox environments and shuts down.
- Rootkit functionality – Hides files, registry keys, and network activity.
- Tor-based C2 servers
- Encrypted exfiltration
- Telegram bot integration
- Registry autorun keys
- DLL sideloading
- Task scheduler abuse