General

  • Target

    fe2f4d4922b69feccf4c63bc6fc1c491_virlock_JC.exe

  • Size

    252KB

  • Sample

    230815-wa5bbaef4x

  • MD5

    fe2f4d4922b69feccf4c63bc6fc1c491

  • SHA1

    9bfd09fb4c6657843b3f0bd60313467362ec5e61

  • SHA256

    f76a5093d4ffa4018ef7cec5ce0f06abac0ce2e088c007eaa06b1e7165c39178

  • SHA512

    7bd6dcb427137d5bf93256bfe9f46fef79db71218904151fd108a15bb48d094eebfc9051d00ecd17334829d851de2306688ab32b54b83e354b528c57bc88de5d

  • SSDEEP

    6144:a6aBMNGNs9udbI7fNVEXUJwUt5LMz4WU+HA5vNa3G3Da17tlYFIAVh:a6KyGNsVt5LMzPU+H4a3G321HSVh

Malware Config

Targets

    • Target

      fe2f4d4922b69feccf4c63bc6fc1c491_virlock_JC.exe

    • Size

      252KB

    • MD5

      fe2f4d4922b69feccf4c63bc6fc1c491

    • SHA1

      9bfd09fb4c6657843b3f0bd60313467362ec5e61

    • SHA256

      f76a5093d4ffa4018ef7cec5ce0f06abac0ce2e088c007eaa06b1e7165c39178

    • SHA512

      7bd6dcb427137d5bf93256bfe9f46fef79db71218904151fd108a15bb48d094eebfc9051d00ecd17334829d851de2306688ab32b54b83e354b528c57bc88de5d

    • SSDEEP

      6144:a6aBMNGNs9udbI7fNVEXUJwUt5LMz4WU+HA5vNa3G3Da17tlYFIAVh:a6KyGNsVt5LMzPU+H4a3G321HSVh

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks