General
-
Target
LDPlayer9_es_1552109_ld.exe
-
Size
2.5MB
-
Sample
241129-3raatssnax
-
MD5
881c61873a75748f9374c63a035afecc
-
SHA1
6e410fb4733044fb131946184fe1fec1bcd68336
-
SHA256
0ba02eb39f93e0b5b408d77ee9937847f4de2244120b3af3f41f8e3425c9281c
-
SHA512
aef9c5343dddf39b94e388691d54910069b2b5b969ebbb0b51b67f6c156049b755169ca19cd4757a0af28622b16672740cff4489d5c90f9a8498e9d449689711
-
SSDEEP
49152:PgwNggyPXuB7fEtKubsISTb/am5B8y6sEUhSSwhUPMub:PgwNggyPX48zbsIW/amj8yF8Sp
Static task
static1
Behavioral task
behavioral1
Sample
LDPlayer9_es_1552109_ld.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
LDPlayer9_es_1552109_ld.exe
-
Size
2.5MB
-
MD5
881c61873a75748f9374c63a035afecc
-
SHA1
6e410fb4733044fb131946184fe1fec1bcd68336
-
SHA256
0ba02eb39f93e0b5b408d77ee9937847f4de2244120b3af3f41f8e3425c9281c
-
SHA512
aef9c5343dddf39b94e388691d54910069b2b5b969ebbb0b51b67f6c156049b755169ca19cd4757a0af28622b16672740cff4489d5c90f9a8498e9d449689711
-
SSDEEP
49152:PgwNggyPXuB7fEtKubsISTb/am5B8y6sEUhSSwhUPMub:PgwNggyPX48zbsIW/amj8yF8Sp
-
Creates new service(s)
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Possible privilege escalation attempt
-
A potential corporate email address has been identified in the URL: currency-file@1
-
Modifies file permissions
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1