General

  • Target

    7d8efaab351a94316256b6a747d6d3ba_virlock_JC.exe

  • Size

    203KB

  • Sample

    230806-ly65psad4x

  • MD5

    7d8efaab351a94316256b6a747d6d3ba

  • SHA1

    641d2076e019e04781e7ec09c4b05945eb004b33

  • SHA256

    55d449d0cb0108184e082514f0546f1c0a9e39a31f95c335cfe4a2604fc0bd11

  • SHA512

    dd5b601461b3418a8fd922f176f396e75eb393c5d6d669fb259ac13d3034833cf28d1f9450fca2af2bbba1136b6f3b309806e0fe8c5509bcbf100186708d7f96

  • SSDEEP

    3072:hy7nuH2ZoRT9aZyswMzulVMletVDXkUZj3CXgAO1enO7llHDHxhKIQ7cvC:+uWSRTsZWMPetVDXkUZjyXgA6KAtO4v

Malware Config

Targets

    • Target

      7d8efaab351a94316256b6a747d6d3ba_virlock_JC.exe

    • Size

      203KB

    • MD5

      7d8efaab351a94316256b6a747d6d3ba

    • SHA1

      641d2076e019e04781e7ec09c4b05945eb004b33

    • SHA256

      55d449d0cb0108184e082514f0546f1c0a9e39a31f95c335cfe4a2604fc0bd11

    • SHA512

      dd5b601461b3418a8fd922f176f396e75eb393c5d6d669fb259ac13d3034833cf28d1f9450fca2af2bbba1136b6f3b309806e0fe8c5509bcbf100186708d7f96

    • SSDEEP

      3072:hy7nuH2ZoRT9aZyswMzulVMletVDXkUZj3CXgAO1enO7llHDHxhKIQ7cvC:+uWSRTsZWMPetVDXkUZjyXgA6KAtO4v

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks