General

  • Target

    LDPlayer9_pt_1259_ld.exe

  • Size

    2.1MB

  • Sample

    250520-zwlmwacn4w

  • MD5

    2ff10fd99b016eac1bb3051b0dc26f5a

  • SHA1

    b35fced9a653dacddf46403c64de46d50ebdc970

  • SHA256

    1d8e1135dfc789d1ebf1d08a8fefc58e22474ae266338b8ff2be3ade2144e442

  • SHA512

    35be9c768aebaf21fceb77aae175ff4d8ea82e7ddeebf9c8c191bbe45d563cc48f8ee41ae67acbffde4f83cf6c4f6a61c04e3e020d508c5c2e36a561c3259107

  • SSDEEP

    49152:ZG3qnJk2lTnXVoU19vb98amDetnlKbhSSwsls:ZG3qJ5xVoU/bcI0b8SDC

Malware Config

Targets

    • Target

      LDPlayer9_pt_1259_ld.exe

    • Size

      2.1MB

    • MD5

      2ff10fd99b016eac1bb3051b0dc26f5a

    • SHA1

      b35fced9a653dacddf46403c64de46d50ebdc970

    • SHA256

      1d8e1135dfc789d1ebf1d08a8fefc58e22474ae266338b8ff2be3ade2144e442

    • SHA512

      35be9c768aebaf21fceb77aae175ff4d8ea82e7ddeebf9c8c191bbe45d563cc48f8ee41ae67acbffde4f83cf6c4f6a61c04e3e020d508c5c2e36a561c3259107

    • SSDEEP

      49152:ZG3qnJk2lTnXVoU19vb98amDetnlKbhSSwsls:ZG3qJ5xVoU/bcI0b8SDC

    • Guerrilla

      Guerrilla is an Android malware used by the Lemon Group threat actor.

    • Guerrilla family

    • Guerrilla payload

    • Otpstealer

      Otpstealer is an Android SMS Stealer that targets OTP first seen in February 2022.

    • Otpstealer family

    • Otpstealer payload

    • Creates new service(s)

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v16

Tasks