General
-
Target
LDPlayer9_ens_1001_ld.exe
-
Size
2.5MB
-
Sample
241014-jl9nyswhkr
-
MD5
9855e448af8561fc920d69a7b45a309b
-
SHA1
9ceb185e61fde58d6db6e3c4e2e7932ca53ce712
-
SHA256
aebbda8979b54ca3094e835ec7bffb08aca6c79480675d46bc5df75d9750a583
-
SHA512
a37495c629c9fd636702f1e1479b0ffd8c7b921cc914a7208478d2b9c348149634bd7736ed41d6627902e8b8e5d5316dbeb3d5783b93574a48b7fb1786fc6d6c
-
SSDEEP
49152:XNfatughHaKLIKN1cueXlaYbsISTb/am5B8y6sEUhSSwoUKd:Xla4ghHaKMu2IYbsIW/amj8yF8SN
Static task
static1
Behavioral task
behavioral1
Sample
LDPlayer9_ens_1001_ld.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
LDPlayer9_ens_1001_ld.exe
-
Size
2.5MB
-
MD5
9855e448af8561fc920d69a7b45a309b
-
SHA1
9ceb185e61fde58d6db6e3c4e2e7932ca53ce712
-
SHA256
aebbda8979b54ca3094e835ec7bffb08aca6c79480675d46bc5df75d9750a583
-
SHA512
a37495c629c9fd636702f1e1479b0ffd8c7b921cc914a7208478d2b9c348149634bd7736ed41d6627902e8b8e5d5316dbeb3d5783b93574a48b7fb1786fc6d6c
-
SSDEEP
49152:XNfatughHaKLIKN1cueXlaYbsISTb/am5B8y6sEUhSSwoUKd:Xla4ghHaKMu2IYbsIW/amj8yF8SN
-
Creates new service(s)
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Possible privilege escalation attempt
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1