Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/01/2025, 16:19

250117-tszsfawjay 10

17/01/2025, 16:15

250117-tqlsssvrbv 8

General

  • Target

    LDPlayer9_ens_com.ewt.purble_25567197_ld.exe

  • Size

    2.1MB

  • Sample

    250117-tszsfawjay

  • MD5

    b38032c2aacdbf4591f3b2232aa2095b

  • SHA1

    6d0693e138848613bb951a8d7ac0965f3e0d7801

  • SHA256

    486ffcca0673fceb2741b0048d8a409ece396c552b6bca6008f342ac8c94be11

  • SHA512

    e3b3681653ca8b9f8c18068cd1965e70b926581636453a963907ee80b16f942519832467a8be6653718ef057f6a792b808b6cc8b1dff28be402d673cb5380b2e

  • SSDEEP

    24576:tFwpqSq7cwxsmDRpnt3O3a0iD3MzvD/RXNgZ2Ppm+x9nGWTysehNBN88LcpmZQ46:2wntJ3MQ2PQ+3Gnb88amDeqhSSwr+I5

Malware Config

Targets

    • Target

      LDPlayer9_ens_com.ewt.purble_25567197_ld.exe

    • Size

      2.1MB

    • MD5

      b38032c2aacdbf4591f3b2232aa2095b

    • SHA1

      6d0693e138848613bb951a8d7ac0965f3e0d7801

    • SHA256

      486ffcca0673fceb2741b0048d8a409ece396c552b6bca6008f342ac8c94be11

    • SHA512

      e3b3681653ca8b9f8c18068cd1965e70b926581636453a963907ee80b16f942519832467a8be6653718ef057f6a792b808b6cc8b1dff28be402d673cb5380b2e

    • SSDEEP

      24576:tFwpqSq7cwxsmDRpnt3O3a0iD3MzvD/RXNgZ2Ppm+x9nGWTysehNBN88LcpmZQ46:2wntJ3MQ2PQ+3Gnb88amDeqhSSwr+I5

    • Guerrilla

      Guerrilla is an Android malware used by the Lemon Group threat actor.

    • Guerrilla family

    • Guerrilla payload

    • Otpstealer

      Otpstealer is an Android SMS Stealer that targets OTP first seen in February 2022.

    • Otpstealer family

    • Otpstealer payload

    • Creates new service(s)

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks