Resubmissions

15-08-2024 00:06

240815-ad6gwsydjm 3

13-08-2024 12:24

240813-pk89patamc 10

13-08-2024 12:19

240813-phnj7ssgrg 10

13-08-2024 12:11

240813-pc2vmsseqh 8

13-08-2024 12:03

240813-n73jzsxblp 7

13-08-2024 12:02

240813-n7qkessckh 1

General

  • Target

    rocket-league-spotify-artwork.png

  • Size

    833KB

  • Sample

    240813-pk89patamc

  • MD5

    28952f1e3e40281a2fab2de9f228bc8a

  • SHA1

    b4db183ea6ad6b6cc31c8cae5c6feba5352a1242

  • SHA256

    40da1cd16fd7dff442fbf3241b58b5857012b0f3c28d84c59b7ff5b97f0ee735

  • SHA512

    26a4d65a82d7594dd7cc65ecf372cd4abeb2367b7dc4589eb5e1ca55b868fae15995f0f3921580348d46e1bf2a6d803ceaad48792dde38c90ae593de8088d0b6

  • SSDEEP

    12288:BXhYChvXgQEOUmrify0TXJq8UXyTIU8sGEcqu6vO3QSWh8Xsq0BD4jJyJoc2HaP6:jHFgQEjQsq3yckGDP3Qvq0BD4jJyJoB

Malware Config

Targets

    • Target

      rocket-league-spotify-artwork.png

    • Size

      833KB

    • MD5

      28952f1e3e40281a2fab2de9f228bc8a

    • SHA1

      b4db183ea6ad6b6cc31c8cae5c6feba5352a1242

    • SHA256

      40da1cd16fd7dff442fbf3241b58b5857012b0f3c28d84c59b7ff5b97f0ee735

    • SHA512

      26a4d65a82d7594dd7cc65ecf372cd4abeb2367b7dc4589eb5e1ca55b868fae15995f0f3921580348d46e1bf2a6d803ceaad48792dde38c90ae593de8088d0b6

    • SSDEEP

      12288:BXhYChvXgQEOUmrify0TXJq8UXyTIU8sGEcqu6vO3QSWh8Xsq0BD4jJyJoc2HaP6:jHFgQEjQsq3yckGDP3Qvq0BD4jJyJoB

    • InfinityLock Ransomware

      Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Probable phishing domain

MITRE ATT&CK Enterprise v15

Tasks