General
-
Target
LDPlayer9_fr_2541_CjwKCAjwmYCzBhA6EiwAxFwfgORfH84ntBkk2Yw9gMxao1bIiq-g3HqCyTnUBBMB99Zg-izGrywfFBoCJz4QAvD_BwE_ld.exe
-
Size
3.3MB
-
Sample
240605-pth4vsfe9z
-
MD5
86fca06e090f8017dd323ccc516a7ed9
-
SHA1
720fd4f4d0ac09308d19d229c8fbfde71313ce7d
-
SHA256
5516ce5826c34dc1d89b1373f09a5eb490cf1dab55f98da02bdc53a73b772874
-
SHA512
05f6ea47c48a2da3304a2d14a741403200ccf47e1f1b7155a2eba3fe694e4f42b8a327010fbc20b720ba06e4f84ee96b39d885989ae7cd20cc459261cd02b34b
-
SSDEEP
49152:SLgmKyhrX/3MwVn1pHtOUYqP3CFOrtG/JR9sXafgkDFMVR9C1UhPJXMK701hOHZ4:IgmKEX/3MS1t0xOoGBiCV2H1l
Static task
static1
Behavioral task
behavioral1
Sample
LDPlayer9_fr_2541_CjwKCAjwmYCzBhA6EiwAxFwfgORfH84ntBkk2Yw9gMxao1bIiq-g3HqCyTnUBBMB99Zg-izGrywfFBoCJz4QAvD_BwE_ld.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
LDPlayer9_fr_2541_CjwKCAjwmYCzBhA6EiwAxFwfgORfH84ntBkk2Yw9gMxao1bIiq-g3HqCyTnUBBMB99Zg-izGrywfFBoCJz4QAvD_BwE_ld.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
LDPlayer9_fr_2541_CjwKCAjwmYCzBhA6EiwAxFwfgORfH84ntBkk2Yw9gMxao1bIiq-g3HqCyTnUBBMB99Zg-izGrywfFBoCJz4QAvD_BwE_ld.exe
-
Size
3.3MB
-
MD5
86fca06e090f8017dd323ccc516a7ed9
-
SHA1
720fd4f4d0ac09308d19d229c8fbfde71313ce7d
-
SHA256
5516ce5826c34dc1d89b1373f09a5eb490cf1dab55f98da02bdc53a73b772874
-
SHA512
05f6ea47c48a2da3304a2d14a741403200ccf47e1f1b7155a2eba3fe694e4f42b8a327010fbc20b720ba06e4f84ee96b39d885989ae7cd20cc459261cd02b34b
-
SSDEEP
49152:SLgmKyhrX/3MwVn1pHtOUYqP3CFOrtG/JR9sXafgkDFMVR9C1UhPJXMK701hOHZ4:IgmKEX/3MS1t0xOoGBiCV2H1l
-
Creates new service(s)
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Modifies file permissions
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1