General

  • Target

    4bbc496738a1a8e95b5b905e1c7e5e26_virlock_JC.exe

  • Size

    197KB

  • Sample

    230803-tqtteafe2z

  • MD5

    4bbc496738a1a8e95b5b905e1c7e5e26

  • SHA1

    51295e2e4a70bc5ab5aeccd4c49e2380fcc66ff1

  • SHA256

    1920ee47df51b289c82baa8bb593db30fb9c094b8a9993bc28cb2ea47e3495d0

  • SHA512

    397eb39c31ee58f4a378d2d65f07f29d3c536f473a4fd091db845a28ef88eed4dd068d0a598bf01b03911883ea0e3b130011b1a4656e3e31843e783b4ad009ad

  • SSDEEP

    3072:N0v6uMCie+3dluOTKiyabfPdIR+q0IgM6KUJgwiwVhxT:whMCibKiyOPK+qVgM6KUHzTT

Malware Config

Targets

    • Target

      4bbc496738a1a8e95b5b905e1c7e5e26_virlock_JC.exe

    • Size

      197KB

    • MD5

      4bbc496738a1a8e95b5b905e1c7e5e26

    • SHA1

      51295e2e4a70bc5ab5aeccd4c49e2380fcc66ff1

    • SHA256

      1920ee47df51b289c82baa8bb593db30fb9c094b8a9993bc28cb2ea47e3495d0

    • SHA512

      397eb39c31ee58f4a378d2d65f07f29d3c536f473a4fd091db845a28ef88eed4dd068d0a598bf01b03911883ea0e3b130011b1a4656e3e31843e783b4ad009ad

    • SSDEEP

      3072:N0v6uMCie+3dluOTKiyabfPdIR+q0IgM6KUJgwiwVhxT:whMCibKiyOPK+qVgM6KUHzTT

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks