General
-
Target
ShareX.desktop
-
Size
265B
-
Sample
240804-m25xgsxhma
-
MD5
25fa2120686fe25029973efe0a65109e
-
SHA1
29003978059e50be4556cf5c0c3c22f77cdffb3a
-
SHA256
0bbb82eec116663be02d2690fcdcfb9b92d199f28e1e8ff8445e2118e37d58c1
-
SHA512
7d54195c50c32645d1c8cf48b6a5e6af8865c37701db03d997289806ae8dde89dd8ce819ede8ef224f4c08e83a7adae1aac98e9e8024f67b1a94bf958a1dc0af
Static task
static1
Behavioral task
behavioral1
Sample
ShareX.desktop
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
ShareX.desktop
-
Size
265B
-
MD5
25fa2120686fe25029973efe0a65109e
-
SHA1
29003978059e50be4556cf5c0c3c22f77cdffb3a
-
SHA256
0bbb82eec116663be02d2690fcdcfb9b92d199f28e1e8ff8445e2118e37d58c1
-
SHA512
7d54195c50c32645d1c8cf48b6a5e6af8865c37701db03d997289806ae8dde89dd8ce819ede8ef224f4c08e83a7adae1aac98e9e8024f67b1a94bf958a1dc0af
-
InfinityLock Ransomware
Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detect jar appended to MSI
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-