General

  • Target

    72122051039a6923b6b2957a00ec0ded_virlock_JC.exe

  • Size

    194KB

  • Sample

    230805-qr5eracg66

  • MD5

    72122051039a6923b6b2957a00ec0ded

  • SHA1

    f8545ed93e119beb0318880035631205b44f1657

  • SHA256

    60e79f3fe2802141befb39f59691127bc405035cd3137b3a23739f55a9058d55

  • SHA512

    74c730b5d0172ee50019f45ca064ffd8814453355902042939abffc28f98b14e7794a2c81f8ed1bcc6132e36632892b3903e3162e334203ffb04f8829cbd2b0a

  • SSDEEP

    3072:znsgoSlk3xsDzUeeKCVINc+G+aoqTf0RHQs5Hai5E8tSDa5vmz:zsgoSq3GMIa+5ocHQs5Haa+a5vmz

Malware Config

Targets

    • Target

      72122051039a6923b6b2957a00ec0ded_virlock_JC.exe

    • Size

      194KB

    • MD5

      72122051039a6923b6b2957a00ec0ded

    • SHA1

      f8545ed93e119beb0318880035631205b44f1657

    • SHA256

      60e79f3fe2802141befb39f59691127bc405035cd3137b3a23739f55a9058d55

    • SHA512

      74c730b5d0172ee50019f45ca064ffd8814453355902042939abffc28f98b14e7794a2c81f8ed1bcc6132e36632892b3903e3162e334203ffb04f8829cbd2b0a

    • SSDEEP

      3072:znsgoSlk3xsDzUeeKCVINc+G+aoqTf0RHQs5Hai5E8tSDa5vmz:zsgoSq3GMIa+5ocHQs5Haa+a5vmz

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks