Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    LDPlayer9_ens_25567197_ld.exe

  • Size

    2.1MB

  • Sample

    250216-ns2n5svjb1

  • MD5

    e511e1991f0d45c438fc25e3b80f6a8d

  • SHA1

    14422f21df326e6bf9c331229df421434bacd73e

  • SHA256

    7c7e4fd7ff311ec6383f420afb2615e9708e4f4245ebaaf734584ec4646047b8

  • SHA512

    5721cbcff91a82522ab758ad3ced8370abf2def8e700cd239b0e35a788957304f16dac0ecd550ea132fe17a7c78bb561403cd2a55e820d15d54ff29645d14c68

  • SSDEEP

    24576:SUSyTxvrd2xQVA/BEifWJgc9Jp1YfWa5fqstMkReprSOTyiRtd5NBN/8LcpmZQ4q:bdLVO4pfuM+e5SElb/8amDe8hSSw8Ix

Malware Config

Targets

    • Target

      LDPlayer9_ens_25567197_ld.exe

    • Size

      2.1MB

    • MD5

      e511e1991f0d45c438fc25e3b80f6a8d

    • SHA1

      14422f21df326e6bf9c331229df421434bacd73e

    • SHA256

      7c7e4fd7ff311ec6383f420afb2615e9708e4f4245ebaaf734584ec4646047b8

    • SHA512

      5721cbcff91a82522ab758ad3ced8370abf2def8e700cd239b0e35a788957304f16dac0ecd550ea132fe17a7c78bb561403cd2a55e820d15d54ff29645d14c68

    • SSDEEP

      24576:SUSyTxvrd2xQVA/BEifWJgc9Jp1YfWa5fqstMkReprSOTyiRtd5NBN/8LcpmZQ4q:bdLVO4pfuM+e5SElb/8amDe8hSSw8Ix

    • Guerrilla

      Guerrilla is an Android malware used by the Lemon Group threat actor.

    • Guerrilla family

    • Guerrilla payload

    • Otpstealer

      Otpstealer is an Android SMS Stealer that targets OTP first seen in February 2022.

    • Otpstealer family

    • Otpstealer payload

    • Creates new service(s)

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks