General

  • Target

    LDPlayer9.0_es_34155917_ld.exe

  • Size

    601.2MB

  • Sample

    230213-dae3baad34

  • MD5

    c9d398b0b57f099e4405d878f8cae4ec

  • SHA1

    0fcab4492c6a47d9846e905b573e6645bb062554

  • SHA256

    688162640eba903f22724905ee4497168948601da9f27aac4de7de5c10c35af0

  • SHA512

    d356918d2dd90c8aa63872ced1650c2ea7b245499307830555b41a8bcac1ad58650c97af0f19a8244a0f6d9d7c2c2a9aac2e9fb4c5e82b0cee32c722e34ce85c

  • SSDEEP

    12582912:BxYOUb/fhhqe2hPmWVsLJV6FObSZBshtzycWRTtc2RNctGwZi+1:PG/fhEe2BGpSs32ztRNctDd

Malware Config

Targets

    • Target

      LDPlayer9.0_es_34155917_ld.exe

    • Size

      601.2MB

    • MD5

      c9d398b0b57f099e4405d878f8cae4ec

    • SHA1

      0fcab4492c6a47d9846e905b573e6645bb062554

    • SHA256

      688162640eba903f22724905ee4497168948601da9f27aac4de7de5c10c35af0

    • SHA512

      d356918d2dd90c8aa63872ced1650c2ea7b245499307830555b41a8bcac1ad58650c97af0f19a8244a0f6d9d7c2c2a9aac2e9fb4c5e82b0cee32c722e34ce85c

    • SSDEEP

      12582912:BxYOUb/fhhqe2hPmWVsLJV6FObSZBshtzycWRTtc2RNctGwZi+1:PG/fhEe2BGpSs32ztRNctDd

    • Detected Gafgyt variant

    • Detects PlugX payload

    • Gafgyt/Bashlite

      IoT botnet with numerous variants first seen in 2014.

    • PlugX

      PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Creates new service(s)

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks