General

  • Target

    Future.dll

  • Size

    23KB

  • Sample

    240210-wgp5zaeg2s

  • MD5

    f9fb09aecaf403eb2b46255978559fd7

  • SHA1

    cd2b838b4afe94c2317c53219a7cb949e5c1ea92

  • SHA256

    edf809eaed4a362565d99be8085fc7164b338dac1fe5a44daaa65e858cb42368

  • SHA512

    147253e5583dc383c686ecdeffc45f537eece26237825fbefbb50f9e452447059359df38078beadfe02e6fe8c2a1a08561e1c354e4cb783b5c2ef17bf92dd82a

  • SSDEEP

    384:SYjaXN90BkCAJpplLHQWWldv9KjV1Vj4qsPRrOq5HejhqK77Kvgbl5E42T5rmOD+:NGXn02pl7QtlvKZvjxsP0qC+vgbYZ5rU

Malware Config

Targets

    • Target

      Future.dll

    • Size

      23KB

    • MD5

      f9fb09aecaf403eb2b46255978559fd7

    • SHA1

      cd2b838b4afe94c2317c53219a7cb949e5c1ea92

    • SHA256

      edf809eaed4a362565d99be8085fc7164b338dac1fe5a44daaa65e858cb42368

    • SHA512

      147253e5583dc383c686ecdeffc45f537eece26237825fbefbb50f9e452447059359df38078beadfe02e6fe8c2a1a08561e1c354e4cb783b5c2ef17bf92dd82a

    • SSDEEP

      384:SYjaXN90BkCAJpplLHQWWldv9KjV1Vj4qsPRrOq5HejhqK77Kvgbl5E42T5rmOD+:NGXn02pl7QtlvKZvjxsP0qC+vgbYZ5rU

    • InfinityLock Ransomware

      Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks