General
-
Target
OBS_OpenVR_InputPlugin_v1.5.zip
-
Size
376KB
-
Sample
241030-fpk8zsxbqd
-
MD5
ee896e6d5aa63aaa4a7a8026ef17f733
-
SHA1
e7b9d36bc14821c69c0091a917b79494786d1be8
-
SHA256
56c972a062395ab5da0e5ffefa9d396d9c238d3266a60dfed7f973f7421aaa84
-
SHA512
3256c814ef2d48de32b9be5eec83557eba8e153a8f2d9da522a819b728851a3023e0c4b911118243db43c054bd6d8417c04af2b628c15226302f7eade91cb268
-
SSDEEP
6144:Rc93EkfsdSCxCShKyIeJ1i9j8l9B3mjXMSOJsCGmasMc6gZHjx0joJxw:u2kfs0ACSh3f1i9jQ9Rq8SOiCGmaT6Hc
Static task
static1
Behavioral task
behavioral1
Sample
obs-plugins/64bit/openvr_api.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
obs-plugins/64bit/win-openvr.dll
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Extracted
C:\Program Files\7-Zip\DECRYPT_YOUR_FILES.HTML
Targets
-
-
Target
obs-plugins/64bit/openvr_api.dll
-
Size
800KB
-
MD5
0f6839c5d77574194f8722e8b0459bb9
-
SHA1
cb6cef06cbf67ba4f9ba994db835b818eefd270b
-
SHA256
dbc05e13b77d34deeaa44b5a7ee425d5def3e86f7c3f81d391bbbc379a4ebefa
-
SHA512
213987fd3436669d4e75cb48058a7f06765f0c25143cfed938b860801be44448dade4263c940f9979b67e25d34ec2cba957e214db32d0885dc7d6943cdbb99d8
-
SSDEEP
12288:Rwzczx7qv9gnwfb9poblx/DVqPfd+i3IBNWytFKrl6oEuv4Gv:Rwix7qv9gnwfb9poP/0g0IB0yo4wv
Score1/10 -
-
-
Target
obs-plugins/64bit/win-openvr.dll
-
Size
23KB
-
MD5
a2fa7bc0a731f2c2c755c6d63086f125
-
SHA1
651b0e9062b6d5ac2880721834abb5258ef0d9b9
-
SHA256
fed97640abb2f0e246ea0f231fac234c2fc9955da2f9009f7fd975fc37feb3ee
-
SHA512
3d1537bb1fc1a40ac716cc1e501a080fd37082b23b503e97908ea6ad2d58840d9b1ebeb683c88ee1e37d302903b4f519eb26c2da7a98e2171a58b0924aed2800
-
SSDEEP
384:HHEptkD102P5nPfeGrX6JyW8I1BoiR0MJfu:SQnBe0WrBoiCuu
-
InfinityLock Ransomware
Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.
-
Infinitylock family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1