General

  • Target

    LDPlayer9_ru_1007_ld.exe

  • Size

    6.2MB

  • Sample

    240710-sshy9avfmn

  • MD5

    d8164d9999866836fcc904dbe63d0d9c

  • SHA1

    732a521c0856f4ee61a6e374d1605f14a3886a4e

  • SHA256

    23da62e4b152739d914094e54c657a5615ebf0c3b8fe43eb9a5c342ee083f9ce

  • SHA512

    30ff54b8d4e1c0d9463786922344b0ffd9f2cd640fcc18f45d441e4fad3d32659c766554aa83a094aefb1186570397ce8aa7d6ae079497fc2c03c792a221730f

  • SSDEEP

    98304:maMOOH01Z71vVOO+svd2YJVr5cOlprwwEGK579UbrGif:maMOA01uCtf5copnEGKF97e

Malware Config

Targets

    • Target

      LDPlayer9_ru_1007_ld.exe

    • Size

      6.2MB

    • MD5

      d8164d9999866836fcc904dbe63d0d9c

    • SHA1

      732a521c0856f4ee61a6e374d1605f14a3886a4e

    • SHA256

      23da62e4b152739d914094e54c657a5615ebf0c3b8fe43eb9a5c342ee083f9ce

    • SHA512

      30ff54b8d4e1c0d9463786922344b0ffd9f2cd640fcc18f45d441e4fad3d32659c766554aa83a094aefb1186570397ce8aa7d6ae079497fc2c03c792a221730f

    • SSDEEP

      98304:maMOOH01Z71vVOO+svd2YJVr5cOlprwwEGK579UbrGif:maMOA01uCtf5copnEGKF97e

    • Creates new service(s)

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks