General
-
Target
Future.dll
-
Size
23KB
-
Sample
240210-wgp5zaeg2s
-
MD5
f9fb09aecaf403eb2b46255978559fd7
-
SHA1
cd2b838b4afe94c2317c53219a7cb949e5c1ea92
-
SHA256
edf809eaed4a362565d99be8085fc7164b338dac1fe5a44daaa65e858cb42368
-
SHA512
147253e5583dc383c686ecdeffc45f537eece26237825fbefbb50f9e452447059359df38078beadfe02e6fe8c2a1a08561e1c354e4cb783b5c2ef17bf92dd82a
-
SSDEEP
384:SYjaXN90BkCAJpplLHQWWldv9KjV1Vj4qsPRrOq5HejhqK77Kvgbl5E42T5rmOD+:NGXn02pl7QtlvKZvjxsP0qC+vgbYZ5rU
Static task
static1
Behavioral task
behavioral1
Sample
Future.dll
Resource
win10-20231215-en
Malware Config
Targets
-
-
Target
Future.dll
-
Size
23KB
-
MD5
f9fb09aecaf403eb2b46255978559fd7
-
SHA1
cd2b838b4afe94c2317c53219a7cb949e5c1ea92
-
SHA256
edf809eaed4a362565d99be8085fc7164b338dac1fe5a44daaa65e858cb42368
-
SHA512
147253e5583dc383c686ecdeffc45f537eece26237825fbefbb50f9e452447059359df38078beadfe02e6fe8c2a1a08561e1c354e4cb783b5c2ef17bf92dd82a
-
SSDEEP
384:SYjaXN90BkCAJpplLHQWWldv9KjV1Vj4qsPRrOq5HejhqK77Kvgbl5E42T5rmOD+:NGXn02pl7QtlvKZvjxsP0qC+vgbYZ5rU
Score10/10-
InfinityLock Ransomware
Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-