General

  • Target

    733a02db163570ba01b3c3df0122f8e9_virlock_JC.exe

  • Size

    252KB

  • Sample

    230805-qzpn9sch59

  • MD5

    733a02db163570ba01b3c3df0122f8e9

  • SHA1

    3009123801435ec678dfc91c5f6e24dfe4b0760a

  • SHA256

    f3235cb37777e4e5ea66c4927adb7935072baffd735e77505bc3e2dd3e62e369

  • SHA512

    f6ecffdfd3e2949ecddd3878d5357002e8f85d7225945443ef9dd1c4476f6da400e86243bfe8496df753f04291363f09abb822a76f81f7441c313d55d03d4068

  • SSDEEP

    6144:q5Vv2sthjOAMJ0Cf8LvQOlCSgmHIdz65La5Bgy8:GOShjORJEdCShH8z40Bu

Malware Config

Targets

    • Target

      733a02db163570ba01b3c3df0122f8e9_virlock_JC.exe

    • Size

      252KB

    • MD5

      733a02db163570ba01b3c3df0122f8e9

    • SHA1

      3009123801435ec678dfc91c5f6e24dfe4b0760a

    • SHA256

      f3235cb37777e4e5ea66c4927adb7935072baffd735e77505bc3e2dd3e62e369

    • SHA512

      f6ecffdfd3e2949ecddd3878d5357002e8f85d7225945443ef9dd1c4476f6da400e86243bfe8496df753f04291363f09abb822a76f81f7441c313d55d03d4068

    • SSDEEP

      6144:q5Vv2sthjOAMJ0Cf8LvQOlCSgmHIdz65La5Bgy8:GOShjORJEdCShH8z40Bu

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks