General

  • Target

    Unit 2 Notes.docx

  • Size

    14KB

  • Sample

    241102-zbheqavepk

  • MD5

    940c60a61b980825d166c05e76760154

  • SHA1

    0229430da5aad0fb91455fff0b6aa25b72d0ddf7

  • SHA256

    ed87702d00232f71ae745658dbdd382162e6e3e4880289f83ae7cc6539131468

  • SHA512

    ed7990548a5b293246d3c45eae18f2c9ed8b16cc1f7467d9e3c08f4b5209275a7df8241dcc073182b3bd9a44e67c262e1f4454253959918a946d854defcce888

  • SSDEEP

    384:d1oyx+qibNxt/ZtNNFscCeh5q69BlSrvJm6/Rt:kyxjiBxllNFPCeSsBkrvk6T

Malware Config

Targets

    • Target

      Unit 2 Notes.docx

    • Size

      14KB

    • MD5

      940c60a61b980825d166c05e76760154

    • SHA1

      0229430da5aad0fb91455fff0b6aa25b72d0ddf7

    • SHA256

      ed87702d00232f71ae745658dbdd382162e6e3e4880289f83ae7cc6539131468

    • SHA512

      ed7990548a5b293246d3c45eae18f2c9ed8b16cc1f7467d9e3c08f4b5209275a7df8241dcc073182b3bd9a44e67c262e1f4454253959918a946d854defcce888

    • SSDEEP

      384:d1oyx+qibNxt/ZtNNFscCeh5q69BlSrvJm6/Rt:kyxjiBxllNFPCeSsBkrvk6T

    • InfinityLock Ransomware

      Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

    • Infinitylock family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks