General

  • Target

    2024-01-01_91283d5928ffaa7196983a9ae646bdf7_virlock

  • Size

    447KB

  • Sample

    240105-ggj7dscger

  • MD5

    91283d5928ffaa7196983a9ae646bdf7

  • SHA1

    165a7572a811dd129c0876f73c2e38b6120d1540

  • SHA256

    93fa9bdb929a1ee4aaece8af8588fee01c4723956ec56bae03e9c9f841c09a80

  • SHA512

    539b421eb911ae014df9cdc1ebae6199317999f89826532d3a28e90032cdb5bd87c1ed684651042f550de4c922c38886442463aaea185e500ca91f25ffb41a4a

  • SSDEEP

    6144:Tf/4JlYD5p7QYUFYQjWzFN5jKYBfQtLuGK3El+QxmhuMahmz8o1x8UFtK8o:T3auUPmFPtuMH3BQxmhdL

Malware Config

Targets

    • Target

      2024-01-01_91283d5928ffaa7196983a9ae646bdf7_virlock

    • Size

      447KB

    • MD5

      91283d5928ffaa7196983a9ae646bdf7

    • SHA1

      165a7572a811dd129c0876f73c2e38b6120d1540

    • SHA256

      93fa9bdb929a1ee4aaece8af8588fee01c4723956ec56bae03e9c9f841c09a80

    • SHA512

      539b421eb911ae014df9cdc1ebae6199317999f89826532d3a28e90032cdb5bd87c1ed684651042f550de4c922c38886442463aaea185e500ca91f25ffb41a4a

    • SSDEEP

      6144:Tf/4JlYD5p7QYUFYQjWzFN5jKYBfQtLuGK3El+QxmhuMahmz8o1x8UFtK8o:T3auUPmFPtuMH3BQxmhdL

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (71) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks