General

  • Target

    39b2993713ebc4f89be21c50c7e5d080_virlock_JC.exe

  • Size

    197KB

  • Sample

    230802-t6s7tafg24

  • MD5

    39b2993713ebc4f89be21c50c7e5d080

  • SHA1

    e65e8b7f80fd9782828ff8eb79e064cae03f90c5

  • SHA256

    a8a6f0667e0b9553d27917f4614770c54e9b0bc25fb6c7711f60b6759213a17c

  • SHA512

    9720296c294377594ff028831c61e72896dfbeedbd3bf4e5aa47a660d02db701c6bff3250396f2365a1bf77ed98d04fbadd1abb7e4bc4452ee18dbcb741ed01b

  • SSDEEP

    3072:TvLFgPwhfGdO2yAoXWEnPYLpw4Clwqm5F8nBC76+e4UAZ:TvLmwNGQ0En54ClwV5ABiIsZ

Malware Config

Targets

    • Target

      39b2993713ebc4f89be21c50c7e5d080_virlock_JC.exe

    • Size

      197KB

    • MD5

      39b2993713ebc4f89be21c50c7e5d080

    • SHA1

      e65e8b7f80fd9782828ff8eb79e064cae03f90c5

    • SHA256

      a8a6f0667e0b9553d27917f4614770c54e9b0bc25fb6c7711f60b6759213a17c

    • SHA512

      9720296c294377594ff028831c61e72896dfbeedbd3bf4e5aa47a660d02db701c6bff3250396f2365a1bf77ed98d04fbadd1abb7e4bc4452ee18dbcb741ed01b

    • SSDEEP

      3072:TvLFgPwhfGdO2yAoXWEnPYLpw4Clwqm5F8nBC76+e4UAZ:TvLmwNGQ0En54ClwV5ABiIsZ

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks