General

  • Target

    6efc7e15a51266dd469ff2d280199aea_virlock_JC.exe

  • Size

    197KB

  • Sample

    230805-p133lscd37

  • MD5

    6efc7e15a51266dd469ff2d280199aea

  • SHA1

    25227e7b7a2b7e7abb4f2d8321430053ae3cc8f6

  • SHA256

    477c5382622446e397ec4d8acc838602414d24fbb3e8372ccaa2709961179027

  • SHA512

    f48d7d5de6204332ea4321778b600ea6bb12685180efe639c752881cbb785e3fb9f70b3de19516b1d96ab3834e260f70ee85181fe1d5019280ed42d930df4b10

  • SSDEEP

    3072:Vuk87bUDRHmMsg43A2f+46bKqPbCegC2QigYRwTJKHPhol5Sf/qMHsMmZeGJCcCU:T8HUDiA2f+46bFglQiFwfU51v0iTJZk

Malware Config

Targets

    • Target

      6efc7e15a51266dd469ff2d280199aea_virlock_JC.exe

    • Size

      197KB

    • MD5

      6efc7e15a51266dd469ff2d280199aea

    • SHA1

      25227e7b7a2b7e7abb4f2d8321430053ae3cc8f6

    • SHA256

      477c5382622446e397ec4d8acc838602414d24fbb3e8372ccaa2709961179027

    • SHA512

      f48d7d5de6204332ea4321778b600ea6bb12685180efe639c752881cbb785e3fb9f70b3de19516b1d96ab3834e260f70ee85181fe1d5019280ed42d930df4b10

    • SSDEEP

      3072:Vuk87bUDRHmMsg43A2f+46bKqPbCegC2QigYRwTJKHPhol5Sf/qMHsMmZeGJCcCU:T8HUDiA2f+46bFglQiFwfU51v0iTJZk

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks