General

  • Target

    79a403f090db22d64fe7b906309d0647_virlock_JC.exe

  • Size

    251KB

  • Sample

    230805-y3j7ysed75

  • MD5

    79a403f090db22d64fe7b906309d0647

  • SHA1

    d6f924aecadadf9f0c48856f693b64d8ef5d0ee0

  • SHA256

    875877cd98abb827aee5c13c901e32985890eb505f3c53785333fd9906a11e61

  • SHA512

    b713afc3cac7c96c0ca308c765c5fd346a0162e4eff6be1caa50c38ebef8770086c26bc1f4c359e17c0b915b7422119849bcdcbdb3759bc421815a17898e84d2

  • SSDEEP

    3072:hW06ZfNJT/14+oT+wnEMAF/ZX/mBfAwlvf+x5sG3i8feTkswEkFtam2:lIfNJB4+oTFUmBrtkyui8fGks3Cta

Malware Config

Targets

    • Target

      79a403f090db22d64fe7b906309d0647_virlock_JC.exe

    • Size

      251KB

    • MD5

      79a403f090db22d64fe7b906309d0647

    • SHA1

      d6f924aecadadf9f0c48856f693b64d8ef5d0ee0

    • SHA256

      875877cd98abb827aee5c13c901e32985890eb505f3c53785333fd9906a11e61

    • SHA512

      b713afc3cac7c96c0ca308c765c5fd346a0162e4eff6be1caa50c38ebef8770086c26bc1f4c359e17c0b915b7422119849bcdcbdb3759bc421815a17898e84d2

    • SSDEEP

      3072:hW06ZfNJT/14+oT+wnEMAF/ZX/mBfAwlvf+x5sG3i8feTkswEkFtam2:lIfNJB4+oTFUmBrtkyui8fGks3Cta

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks