Resubmissions

11-10-2024 17:38

241011-v7465svclb 1

10-10-2024 17:56

241010-wjg75sydre 1

10-10-2024 17:55

241010-whnnjaydnb 6

10-10-2024 17:50

241010-we39tayclf 3

30-08-2024 15:35

240830-s1k4ks1fpb 3

30-08-2024 14:40

240830-r13g7ayhne 5

29-08-2024 17:21

240829-vxgyvsvbql 3

29-08-2024 17:21

240829-vwyj8asenc 5

28-08-2024 16:19

240828-tsxyvaxenn 5

27-08-2024 18:40

240827-xbb7laxcnk 3

General

  • Target

    https://github.com/Endermanch/MalwareDatabase

  • Sample

    230921-xqb55sca77

Malware Config

Targets

    • Target

      https://github.com/Endermanch/MalwareDatabase

    • InfinityLock Ransomware

      Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Windows security modification

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks