General

  • Target

    2023042943b0d0edc589bc618437dce7569a6afevirlock.bin

  • Size

    195KB

  • Sample

    230506-zppqysde37

  • MD5

    43b0d0edc589bc618437dce7569a6afe

  • SHA1

    16d7264aebdd20084c295eb382b8e75dbef80ebc

  • SHA256

    ec6a5ff92fa25f947dc3f445279ec429e4788e2e795c75e5ee5aeb433087b236

  • SHA512

    3921ce305f9bdbefa8b380912ed29f82672deee8c6d9d88097af6ba9fcaf83c047cae43e205a1367af4d14fa234da8a7002ddf6860dcca7783a5558d6fe043d3

  • SSDEEP

    6144:8YyJS7bcXbaO8E1mYxgbch3XgctcMQmn:lyY7bcXbaO8E1mYictXTmMQmn

Malware Config

Targets

    • Target

      2023042943b0d0edc589bc618437dce7569a6afevirlock.bin

    • Size

      195KB

    • MD5

      43b0d0edc589bc618437dce7569a6afe

    • SHA1

      16d7264aebdd20084c295eb382b8e75dbef80ebc

    • SHA256

      ec6a5ff92fa25f947dc3f445279ec429e4788e2e795c75e5ee5aeb433087b236

    • SHA512

      3921ce305f9bdbefa8b380912ed29f82672deee8c6d9d88097af6ba9fcaf83c047cae43e205a1367af4d14fa234da8a7002ddf6860dcca7783a5558d6fe043d3

    • SSDEEP

      6144:8YyJS7bcXbaO8E1mYxgbch3XgctcMQmn:lyY7bcXbaO8E1mYictXTmMQmn

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks