General
-
Target
LDPlayer9_pt_1552109_ld.exe
-
Size
3.4MB
-
Sample
241011-1gvsnsvfpe
-
MD5
d3f42950472326bca3051521650155bd
-
SHA1
97f81696dd2b9f0289c6a6002017007ab2a7b463
-
SHA256
f85ba2e1604219d15c2b7816312f0c530411416cf3789fcc0ab73d7ee6dce36a
-
SHA512
45d9e6d7bfaf0f234034b0c78c8e0301e95f3b0d05f189ca29080100a8fadca78ca3a784183a1116a6655cca839f8890f702c2d5b2090e028503ff2a67ec44e3
-
SSDEEP
49152:T1Be0WwNjL2UmeJJY1pHtOUYqP3CFOrtG/tTR9sXafgkDFMVR9C1UhPJXMK701hX:Tze0/jL2Umec1t0xOoVMBiCV2HkK
Static task
static1
Behavioral task
behavioral1
Sample
LDPlayer9_pt_1552109_ld.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LDPlayer9_pt_1552109_ld.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
LDPlayer9_pt_1552109_ld.exe
-
Size
3.4MB
-
MD5
d3f42950472326bca3051521650155bd
-
SHA1
97f81696dd2b9f0289c6a6002017007ab2a7b463
-
SHA256
f85ba2e1604219d15c2b7816312f0c530411416cf3789fcc0ab73d7ee6dce36a
-
SHA512
45d9e6d7bfaf0f234034b0c78c8e0301e95f3b0d05f189ca29080100a8fadca78ca3a784183a1116a6655cca839f8890f702c2d5b2090e028503ff2a67ec44e3
-
SSDEEP
49152:T1Be0WwNjL2UmeJJY1pHtOUYqP3CFOrtG/tTR9sXafgkDFMVR9C1UhPJXMK701hX:Tze0/jL2Umec1t0xOoVMBiCV2HkK
-
Creates new service(s)
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Possible privilege escalation attempt
-
Modifies file permissions
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Downloads MZ/PE file
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1