General

  • Target

    a1381cbf517d00754f60747a12d641ff_virlock_JC.exe

  • Size

    197KB

  • Sample

    230808-w4g3wafa87

  • MD5

    a1381cbf517d00754f60747a12d641ff

  • SHA1

    0c647768cbb9cb39005fe5f1806ea478bde194f4

  • SHA256

    e1a02bdd8046168f5d59f92067e3a74329b5981b4e614ce9f12556c00abb56d3

  • SHA512

    f05134865a13618191403307fae99254278cb387391e6bcfd4c5a2d2cdbd0bc9da9dcd5b5790fbcdfd4e9ac278e53e445d21afcb8769835024153f0153497bf5

  • SSDEEP

    3072:v1IE4QQEQUAhQEZvaeAyyyUmmaCu0fqr9UMI0LhLgzJT3FivB4Z5tPeiNCK2Wt+e:dIE493UAhMVmKmiAKLynVEC+R1hNUe

Malware Config

Targets

    • Target

      a1381cbf517d00754f60747a12d641ff_virlock_JC.exe

    • Size

      197KB

    • MD5

      a1381cbf517d00754f60747a12d641ff

    • SHA1

      0c647768cbb9cb39005fe5f1806ea478bde194f4

    • SHA256

      e1a02bdd8046168f5d59f92067e3a74329b5981b4e614ce9f12556c00abb56d3

    • SHA512

      f05134865a13618191403307fae99254278cb387391e6bcfd4c5a2d2cdbd0bc9da9dcd5b5790fbcdfd4e9ac278e53e445d21afcb8769835024153f0153497bf5

    • SSDEEP

      3072:v1IE4QQEQUAhQEZvaeAyyyUmmaCu0fqr9UMI0LhLgzJT3FivB4Z5tPeiNCK2Wt+e:dIE493UAhMVmKmiAKLynVEC+R1hNUe

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks