General

  • Target

    ratnik.txt

  • Size

    21B

  • Sample

    240207-lfqd8sgdhn

  • MD5

    6ec911c79fcffa22e46079292a793f13

  • SHA1

    d4842709ea2737b81f7b2a624232b865f0cbd709

  • SHA256

    fe72988e58e7c97db9d8709ad546b2db7cf2a46e52d56ecb60a916c38521eac2

  • SHA512

    7a53fa1f36de8bfb047600a636b3be1055c6ec68eb28d0e929a6f1d27632296442dced59c7f2a8664b1ac49f975bde062c349cca24a0afeb23cc2d662efef412

Malware Config

Targets

    • Target

      ratnik.txt

    • Size

      21B

    • MD5

      6ec911c79fcffa22e46079292a793f13

    • SHA1

      d4842709ea2737b81f7b2a624232b865f0cbd709

    • SHA256

      fe72988e58e7c97db9d8709ad546b2db7cf2a46e52d56ecb60a916c38521eac2

    • SHA512

      7a53fa1f36de8bfb047600a636b3be1055c6ec68eb28d0e929a6f1d27632296442dced59c7f2a8664b1ac49f975bde062c349cca24a0afeb23cc2d662efef412

    • InfinityLock Ransomware

      Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (59) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

6
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks