General

  • Target

    LDPlayer9_ens_1001_ld.exe

  • Size

    2.5MB

  • Sample

    241014-jl9nyswhkr

  • MD5

    9855e448af8561fc920d69a7b45a309b

  • SHA1

    9ceb185e61fde58d6db6e3c4e2e7932ca53ce712

  • SHA256

    aebbda8979b54ca3094e835ec7bffb08aca6c79480675d46bc5df75d9750a583

  • SHA512

    a37495c629c9fd636702f1e1479b0ffd8c7b921cc914a7208478d2b9c348149634bd7736ed41d6627902e8b8e5d5316dbeb3d5783b93574a48b7fb1786fc6d6c

  • SSDEEP

    49152:XNfatughHaKLIKN1cueXlaYbsISTb/am5B8y6sEUhSSwoUKd:Xla4ghHaKMu2IYbsIW/amj8yF8SN

Malware Config

Targets

    • Target

      LDPlayer9_ens_1001_ld.exe

    • Size

      2.5MB

    • MD5

      9855e448af8561fc920d69a7b45a309b

    • SHA1

      9ceb185e61fde58d6db6e3c4e2e7932ca53ce712

    • SHA256

      aebbda8979b54ca3094e835ec7bffb08aca6c79480675d46bc5df75d9750a583

    • SHA512

      a37495c629c9fd636702f1e1479b0ffd8c7b921cc914a7208478d2b9c348149634bd7736ed41d6627902e8b8e5d5316dbeb3d5783b93574a48b7fb1786fc6d6c

    • SSDEEP

      49152:XNfatughHaKLIKN1cueXlaYbsISTb/am5B8y6sEUhSSwoUKd:Xla4ghHaKMu2IYbsIW/amj8yF8SN

    • Creates new service(s)

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks