General
-
Target
LDPlayer9.0_es_1260_ld.exe
-
Size
601.3MB
-
Sample
230228-f1bhxshe4w
-
MD5
1eeabc6eec8b0bb07b62a00d8bd7d62e
-
SHA1
6a07c523c4528a64868945e882faba516a0f772c
-
SHA256
8cdd13b91d01a6bf4fcb2465cd14e8427c4e38232726ee3481601d2c645d75e7
-
SHA512
29594e66cd8c631a0128c4d9a84c4e523ee7bc66fbeb3dbcabfe6ddef2d5c6cd400ddf2bc36ba1a4c05625d52768a1082af96bcfffe4eecca09d54dc7ec439aa
-
SSDEEP
12582912:kMYOUb/fhhqe2hPmWVsLJV6FObSZBshtzycWRTtc2RNctGwZeP:1G/fhEe2BGpSs32ztRNctDUP
Static task
static1
Behavioral task
behavioral1
Sample
LDPlayer9.0_es_1260_ld.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
LDPlayer9.0_es_1260_ld.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
LDPlayer9.0_es_1260_ld.exe
-
Size
601.3MB
-
MD5
1eeabc6eec8b0bb07b62a00d8bd7d62e
-
SHA1
6a07c523c4528a64868945e882faba516a0f772c
-
SHA256
8cdd13b91d01a6bf4fcb2465cd14e8427c4e38232726ee3481601d2c645d75e7
-
SHA512
29594e66cd8c631a0128c4d9a84c4e523ee7bc66fbeb3dbcabfe6ddef2d5c6cd400ddf2bc36ba1a4c05625d52768a1082af96bcfffe4eecca09d54dc7ec439aa
-
SSDEEP
12582912:kMYOUb/fhhqe2hPmWVsLJV6FObSZBshtzycWRTtc2RNctGwZeP:1G/fhEe2BGpSs32ztRNctDUP
-
Detected Gafgyt variant
-
Detects PlugX payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Creates new service(s)
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Registers COM server for autorun
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-