General

  • Target

    0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe

  • Size

    199KB

  • Sample

    230816-wwantsef7z

  • MD5

    0cfe834c6ed3a8a1504a72442e897e14

  • SHA1

    17dfea29a9824283f11c3a11c570595844ea4f59

  • SHA256

    0a275934bb5f8a5cdb4f58d9f1eeeb93fece7220c7a2c6480583a45f7ef0525b

  • SHA512

    11fe21f60ee966168f905c2da6e34f8f827d84230a3af52db364c9cd37417c4413b3dbb93145f967da65902b65825b9bbd3e3c10835d1248b3739dec25e95cb3

  • SSDEEP

    3072:gcam+Kr1b98tM/pLWfZe//INDX89gksXAC6XaMEAzNm+caaXPf/SoRB:q7Kr1sM/S2Iq9gkjCmaMEbTX3qCB

Malware Config

Targets

    • Target

      0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe

    • Size

      199KB

    • MD5

      0cfe834c6ed3a8a1504a72442e897e14

    • SHA1

      17dfea29a9824283f11c3a11c570595844ea4f59

    • SHA256

      0a275934bb5f8a5cdb4f58d9f1eeeb93fece7220c7a2c6480583a45f7ef0525b

    • SHA512

      11fe21f60ee966168f905c2da6e34f8f827d84230a3af52db364c9cd37417c4413b3dbb93145f967da65902b65825b9bbd3e3c10835d1248b3739dec25e95cb3

    • SSDEEP

      3072:gcam+Kr1b98tM/pLWfZe//INDX89gksXAC6XaMEAzNm+caaXPf/SoRB:q7Kr1sM/S2Iq9gkjCmaMEbTX3qCB

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks