General

  • Target

    LDPlayer9_pt_1552109_ld.exe

  • Size

    3.4MB

  • Sample

    241011-1gvsnsvfpe

  • MD5

    d3f42950472326bca3051521650155bd

  • SHA1

    97f81696dd2b9f0289c6a6002017007ab2a7b463

  • SHA256

    f85ba2e1604219d15c2b7816312f0c530411416cf3789fcc0ab73d7ee6dce36a

  • SHA512

    45d9e6d7bfaf0f234034b0c78c8e0301e95f3b0d05f189ca29080100a8fadca78ca3a784183a1116a6655cca839f8890f702c2d5b2090e028503ff2a67ec44e3

  • SSDEEP

    49152:T1Be0WwNjL2UmeJJY1pHtOUYqP3CFOrtG/tTR9sXafgkDFMVR9C1UhPJXMK701hX:Tze0/jL2Umec1t0xOoVMBiCV2HkK

Malware Config

Targets

    • Target

      LDPlayer9_pt_1552109_ld.exe

    • Size

      3.4MB

    • MD5

      d3f42950472326bca3051521650155bd

    • SHA1

      97f81696dd2b9f0289c6a6002017007ab2a7b463

    • SHA256

      f85ba2e1604219d15c2b7816312f0c530411416cf3789fcc0ab73d7ee6dce36a

    • SHA512

      45d9e6d7bfaf0f234034b0c78c8e0301e95f3b0d05f189ca29080100a8fadca78ca3a784183a1116a6655cca839f8890f702c2d5b2090e028503ff2a67ec44e3

    • SSDEEP

      49152:T1Be0WwNjL2UmeJJY1pHtOUYqP3CFOrtG/tTR9sXafgkDFMVR9C1UhPJXMK701hX:Tze0/jL2Umec1t0xOoVMBiCV2HkK

    • Creates new service(s)

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Downloads MZ/PE file

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks