Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
LDPlayer9_ens_25567197_ld.exe
-
Size
2.1MB
-
Sample
250216-ns2n5svjb1
-
MD5
e511e1991f0d45c438fc25e3b80f6a8d
-
SHA1
14422f21df326e6bf9c331229df421434bacd73e
-
SHA256
7c7e4fd7ff311ec6383f420afb2615e9708e4f4245ebaaf734584ec4646047b8
-
SHA512
5721cbcff91a82522ab758ad3ced8370abf2def8e700cd239b0e35a788957304f16dac0ecd550ea132fe17a7c78bb561403cd2a55e820d15d54ff29645d14c68
-
SSDEEP
24576:SUSyTxvrd2xQVA/BEifWJgc9Jp1YfWa5fqstMkReprSOTyiRtd5NBN/8LcpmZQ4q:bdLVO4pfuM+e5SElb/8amDe8hSSw8Ix
Static task
static1
Behavioral task
behavioral1
Sample
LDPlayer9_ens_25567197_ld.exe
Resource
win11-20250211-en
Malware Config
Targets
-
-
Target
LDPlayer9_ens_25567197_ld.exe
-
Size
2.1MB
-
MD5
e511e1991f0d45c438fc25e3b80f6a8d
-
SHA1
14422f21df326e6bf9c331229df421434bacd73e
-
SHA256
7c7e4fd7ff311ec6383f420afb2615e9708e4f4245ebaaf734584ec4646047b8
-
SHA512
5721cbcff91a82522ab758ad3ced8370abf2def8e700cd239b0e35a788957304f16dac0ecd550ea132fe17a7c78bb561403cd2a55e820d15d54ff29645d14c68
-
SSDEEP
24576:SUSyTxvrd2xQVA/BEifWJgc9Jp1YfWa5fqstMkReprSOTyiRtd5NBN/8LcpmZQ4q:bdLVO4pfuM+e5SElb/8amDe8hSSw8Ix
-
Guerrilla
Guerrilla is an Android malware used by the Lemon Group threat actor.
-
Guerrilla family
-
Guerrilla payload
-
Otpstealer
Otpstealer is an Android SMS Stealer that targets OTP first seen in February 2022.
-
Otpstealer family
-
Otpstealer payload
-
Creates new service(s)
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Possible privilege escalation attempt
-
Modifies file permissions
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1