General

  • Target

    bf1f0f4b5ca40881613d79ca6167e58e_virlock_JC.exe

  • Size

    8.5MB

  • Sample

    230828-tz4d7sch24

  • MD5

    bf1f0f4b5ca40881613d79ca6167e58e

  • SHA1

    a0ac7705b4e4865f5049de6862355f06df117a65

  • SHA256

    269e4233370e7da4129e6276df1489203b56d9cf0cd688f42f39a961cd14daf1

  • SHA512

    605a57c6395281cef36f7d9bad348a0e30dbb017ed9b48040f953dd15493194d091be22358378f4cb5c9b52ceca572f12653547bfec097b631323dedbf9bbc32

  • SSDEEP

    196608:k4zQB0AIYDWgxYg4yRsYLOuBuKQZHuaqaWreGtCSNSRPTJr9y:eBjugSdKcHjetCzxB9y

Malware Config

Targets

    • Target

      bf1f0f4b5ca40881613d79ca6167e58e_virlock_JC.exe

    • Size

      8.5MB

    • MD5

      bf1f0f4b5ca40881613d79ca6167e58e

    • SHA1

      a0ac7705b4e4865f5049de6862355f06df117a65

    • SHA256

      269e4233370e7da4129e6276df1489203b56d9cf0cd688f42f39a961cd14daf1

    • SHA512

      605a57c6395281cef36f7d9bad348a0e30dbb017ed9b48040f953dd15493194d091be22358378f4cb5c9b52ceca572f12653547bfec097b631323dedbf9bbc32

    • SSDEEP

      196608:k4zQB0AIYDWgxYg4yRsYLOuBuKQZHuaqaWreGtCSNSRPTJr9y:eBjugSdKcHjetCzxB9y

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks