Resubmissions

21-07-2024 01:22

240721-brplzascqc 10

21-07-2024 01:15

240721-bmp2yascma 10

21-07-2024 00:51

240721-a7f44asamb 3

General

  • Target

    .gitignore

  • Size

    13B

  • Sample

    240721-bmp2yascma

  • MD5

    8de70a2cb48504f474cccade2cc3d20b

  • SHA1

    7cfe378309941545d80f7d6a20348294e02ed9a4

  • SHA256

    a251b542f8d816aa389009d8e1cb059d35c5553387362a07b030161b076432b3

  • SHA512

    221747e0b98083359980b6ec9659703659a2d78715e6d0fdf089e63487c88811352702c9656128238bda8c378cf6bdb713b683b6cf92257db31b375f83de9bf0

Malware Config

Targets

    • Target

      .gitignore

    • Size

      13B

    • MD5

      8de70a2cb48504f474cccade2cc3d20b

    • SHA1

      7cfe378309941545d80f7d6a20348294e02ed9a4

    • SHA256

      a251b542f8d816aa389009d8e1cb059d35c5553387362a07b030161b076432b3

    • SHA512

      221747e0b98083359980b6ec9659703659a2d78715e6d0fdf089e63487c88811352702c9656128238bda8c378cf6bdb713b683b6cf92257db31b375f83de9bf0

    • BadRabbit

      Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

    • InfinityLock Ransomware

      Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks