General

  • Target

    2024-01-09_dc486f3caf18a13ea8437c40a0a56430_virlock

  • Size

    187KB

  • Sample

    240110-grnybshegl

  • MD5

    dc486f3caf18a13ea8437c40a0a56430

  • SHA1

    50949dc3b134c3acdf6938a428fc59debe1c8133

  • SHA256

    1ba487db24ff779fb20cdd2dcb51b7c6aad505a0b73261dbb79a5a85457ef0ce

  • SHA512

    0b950e2b62e9ba98a132c75e9858be68a46b5e1fde8f940fcaa14373c5071d7a00b22706892c5bab0a76a84b52b174666072c1ecdea6415fbd7596e1d421cb06

  • SSDEEP

    3072:UCtr8LFBcbqgM5JWoq60fw6s/iNTO0/CEaEv3TqQrxdf4GqjH:l98cbql446s/0h/Cmv57QGE

Malware Config

Targets

    • Target

      2024-01-09_dc486f3caf18a13ea8437c40a0a56430_virlock

    • Size

      187KB

    • MD5

      dc486f3caf18a13ea8437c40a0a56430

    • SHA1

      50949dc3b134c3acdf6938a428fc59debe1c8133

    • SHA256

      1ba487db24ff779fb20cdd2dcb51b7c6aad505a0b73261dbb79a5a85457ef0ce

    • SHA512

      0b950e2b62e9ba98a132c75e9858be68a46b5e1fde8f940fcaa14373c5071d7a00b22706892c5bab0a76a84b52b174666072c1ecdea6415fbd7596e1d421cb06

    • SSDEEP

      3072:UCtr8LFBcbqgM5JWoq60fw6s/iNTO0/CEaEv3TqQrxdf4GqjH:l98cbql446s/0h/Cmv57QGE

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks