General

  • Target

    6c6f2e5164f751c89e53bfcefe405793_virlock_JC.exe

  • Size

    724KB

  • Sample

    230805-m76qzabh54

  • MD5

    6c6f2e5164f751c89e53bfcefe405793

  • SHA1

    342ff7081c068285bba1262f588a3091ed4c5f77

  • SHA256

    e550e6ffcbdbe514c5f46fbc1c289430c9ba81d394d7c66f3fc83342d2e9823d

  • SHA512

    43337d58c20d98b190aac549b098120b64bd7ffe6dcd497b47611e876b10e7228b1ab2a089dc64dd53dbae345f9d3d945b288cf5dbaab777e66b76283523ad97

  • SSDEEP

    12288:M5dBK7Fwbhy8Wcx98RtDqvg2cGCP0arhFmPMRN9Sf6:u3K7Ox98RtDqvgNoarhpbC

Malware Config

Targets

    • Target

      6c6f2e5164f751c89e53bfcefe405793_virlock_JC.exe

    • Size

      724KB

    • MD5

      6c6f2e5164f751c89e53bfcefe405793

    • SHA1

      342ff7081c068285bba1262f588a3091ed4c5f77

    • SHA256

      e550e6ffcbdbe514c5f46fbc1c289430c9ba81d394d7c66f3fc83342d2e9823d

    • SHA512

      43337d58c20d98b190aac549b098120b64bd7ffe6dcd497b47611e876b10e7228b1ab2a089dc64dd53dbae345f9d3d945b288cf5dbaab777e66b76283523ad97

    • SSDEEP

      12288:M5dBK7Fwbhy8Wcx98RtDqvg2cGCP0arhFmPMRN9Sf6:u3K7Ox98RtDqvgNoarhpbC

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks