General

  • Target

    ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe

  • Size

    232KB

  • Sample

    230815-wj81vscf84

  • MD5

    ff0f7520359a10c59ae0f8598eb97a31

  • SHA1

    057a9457c201239b3908041d6c18dfd02cfc5dfc

  • SHA256

    e4f388346b41a3624d36f6bdbd29a342a954618f72731225b8f3c07f9fbc90bf

  • SHA512

    b9cfb963d6d17cbef7488f86a37a9f6146dac236d42c32193795c51eaa0456e97aaffede0d807140fd65a14c3d8d73c1cb73ad17728b995e2eb01a5024ad8e37

  • SSDEEP

    6144:RKixt59YB5T4XyWMv/1txzW3qgwuU6Dzf:45TVVzzngO6Dj

Malware Config

Targets

    • Target

      ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe

    • Size

      232KB

    • MD5

      ff0f7520359a10c59ae0f8598eb97a31

    • SHA1

      057a9457c201239b3908041d6c18dfd02cfc5dfc

    • SHA256

      e4f388346b41a3624d36f6bdbd29a342a954618f72731225b8f3c07f9fbc90bf

    • SHA512

      b9cfb963d6d17cbef7488f86a37a9f6146dac236d42c32193795c51eaa0456e97aaffede0d807140fd65a14c3d8d73c1cb73ad17728b995e2eb01a5024ad8e37

    • SSDEEP

      6144:RKixt59YB5T4XyWMv/1txzW3qgwuU6Dzf:45TVVzzngO6Dj

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks