General

  • Target

    LDPlayer9_ru_1007_ld.exe

  • Size

    6.2MB

  • Sample

    240702-yjg89azepm

  • MD5

    e0e91d2d5ecc36bde3a3ba87342c4442

  • SHA1

    47dbd2d9ad2ac3c830339bada9f5daa1c7c993a2

  • SHA256

    86e78c5424bca2e9f9b84c50e251118573dc22bcee6ff908362b6b0e37205bdc

  • SHA512

    b1e2e7fb492158f5fa2ece54bd5a805a5dd97b1eca8d0da3d1ec2bfe8c55220acacf4627384e62745d440b263e1b416177094e33729b1bba97d414ebb575eb86

  • SSDEEP

    98304:TaMOOH01Z71vVOO+svd2YJVr5cOlprwwEGK579UbrGi:TaMOA01uCtf5copnEGKF97

Malware Config

Targets

    • Target

      LDPlayer9_ru_1007_ld.exe

    • Size

      6.2MB

    • MD5

      e0e91d2d5ecc36bde3a3ba87342c4442

    • SHA1

      47dbd2d9ad2ac3c830339bada9f5daa1c7c993a2

    • SHA256

      86e78c5424bca2e9f9b84c50e251118573dc22bcee6ff908362b6b0e37205bdc

    • SHA512

      b1e2e7fb492158f5fa2ece54bd5a805a5dd97b1eca8d0da3d1ec2bfe8c55220acacf4627384e62745d440b263e1b416177094e33729b1bba97d414ebb575eb86

    • SSDEEP

      98304:TaMOOH01Z71vVOO+svd2YJVr5cOlprwwEGK579UbrGi:TaMOA01uCtf5copnEGKF97

    • Guerrilla

      Guerrilla is an Android malware used by the Lemon Group threat actor.

    • Guerrilla payload

    • Creates new service(s)

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.