Resubmissions

11-08-2024 09:34

240811-lj7spatfmr 3

11-08-2024 09:33

240811-ljm4aatflj 10

11-08-2024 09:30

240811-lgn8katenn 10

General

  • Target

    groxmc.png

  • Size

    2KB

  • Sample

    240811-ljm4aatflj

  • MD5

    5023085e12fb0144d7b97ef02a9f3087

  • SHA1

    241799fdb6fad6beacd8940e3126a4be043b47ee

  • SHA256

    bfddb29a0802115a8fb0192c82a7dce62c2665cae567f7874cd11a1b7fa4a344

  • SHA512

    c72ab5bb7b33f49945cb8b248cc114ae84fb6dd58f876c121c1ddb5b64e38ef7b637fbc2df5c74568ab8d385b76d9798195a61d1b494baed33b61231135db5e6

Malware Config

Targets

    • Target

      groxmc.png

    • Size

      2KB

    • MD5

      5023085e12fb0144d7b97ef02a9f3087

    • SHA1

      241799fdb6fad6beacd8940e3126a4be043b47ee

    • SHA256

      bfddb29a0802115a8fb0192c82a7dce62c2665cae567f7874cd11a1b7fa4a344

    • SHA512

      c72ab5bb7b33f49945cb8b248cc114ae84fb6dd58f876c121c1ddb5b64e38ef7b637fbc2df5c74568ab8d385b76d9798195a61d1b494baed33b61231135db5e6

    • InfinityLock Ransomware

      Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks