General

  • Target

    20230429c4180c4cfdfccba5d63f4fc75d6709bevirlock.bin

  • Size

    269KB

  • Sample

    230506-zp9q5ade83

  • MD5

    c4180c4cfdfccba5d63f4fc75d6709be

  • SHA1

    4ce33b3f47f0e7f3ca2868bceabb9c066558d846

  • SHA256

    14cdda84fd4995649f421f90850632617cc5d8eaa71a24a70a8e36f232c9b8f1

  • SHA512

    4f4d40ea4c118157e809f354280ef6941e3de9071280cf1e2a95365e52487d0b6b69acd5aab10953c7df8a27a563610031c1f63a4b425c122bd4a2d89ac64297

  • SSDEEP

    6144:v4wavaK4RYFJFg1fqJmUHl8E7+F5DfmXfh3:veCK4oFB8n3KXfF

Malware Config

Targets

    • Target

      20230429c4180c4cfdfccba5d63f4fc75d6709bevirlock.bin

    • Size

      269KB

    • MD5

      c4180c4cfdfccba5d63f4fc75d6709be

    • SHA1

      4ce33b3f47f0e7f3ca2868bceabb9c066558d846

    • SHA256

      14cdda84fd4995649f421f90850632617cc5d8eaa71a24a70a8e36f232c9b8f1

    • SHA512

      4f4d40ea4c118157e809f354280ef6941e3de9071280cf1e2a95365e52487d0b6b69acd5aab10953c7df8a27a563610031c1f63a4b425c122bd4a2d89ac64297

    • SSDEEP

      6144:v4wavaK4RYFJFg1fqJmUHl8E7+F5DfmXfh3:veCK4oFB8n3KXfF

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks