General

  • Target

    7ffe3d4ab24d0e801996fc9c7207f88f_virlock_JC.exe

  • Size

    183KB

  • Sample

    230806-mjhn8shc45

  • MD5

    7ffe3d4ab24d0e801996fc9c7207f88f

  • SHA1

    65ee81e7e2b1e8fba8ec51f44a9b08a7e0874db6

  • SHA256

    9cdd0d7664bbae35e11eee64da4cf517976fc2d4ba50503332c09d6b30cd2aff

  • SHA512

    a79d3e93a684996226e01d06d00134485bcd56dec7947c357a20565099bfbe8703cd83ac4793317272bffe64eae737ccfc92d6659804b3495d65a7def461284b

  • SSDEEP

    3072:skdGgn1BmkNQcFUMrb31QI+QsEGUkVLHTrJOnAE4VgN4R8jZRb:lxjmYQcFLblQQstUkVbpOAHaN4RAHb

Malware Config

Targets

    • Target

      7ffe3d4ab24d0e801996fc9c7207f88f_virlock_JC.exe

    • Size

      183KB

    • MD5

      7ffe3d4ab24d0e801996fc9c7207f88f

    • SHA1

      65ee81e7e2b1e8fba8ec51f44a9b08a7e0874db6

    • SHA256

      9cdd0d7664bbae35e11eee64da4cf517976fc2d4ba50503332c09d6b30cd2aff

    • SHA512

      a79d3e93a684996226e01d06d00134485bcd56dec7947c357a20565099bfbe8703cd83ac4793317272bffe64eae737ccfc92d6659804b3495d65a7def461284b

    • SSDEEP

      3072:skdGgn1BmkNQcFUMrb31QI+QsEGUkVLHTrJOnAE4VgN4R8jZRb:lxjmYQcFLblQQstUkVbpOAHaN4RAHb

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks