General

  • Target

    2024-01-10_7c2210ee2de3ef9d78f30f5a583e6248_virlock

  • Size

    253KB

  • Sample

    240111-gkvgjahge9

  • MD5

    7c2210ee2de3ef9d78f30f5a583e6248

  • SHA1

    7a2489f19b5f80e0214eb681349667585bbc1f75

  • SHA256

    160b444f5fb6288d959e48ebd3270fb1eaae132136a5bb6b61415eccc9868820

  • SHA512

    ddc781a2c3f0f50e584ccd42a80e7f935036aa5fd830acbb804c9019ea9ed1fbd6a24c42796849aedb45e9db1ca3a4a2579b560e9bd98ce8dd3dd5bb0c9a5821

  • SSDEEP

    6144:GNbwT7wZ/u22bC4QhHIw155YR2cFkCuP61I7:GNkfwpt4QhHIw+RmNi27

Malware Config

Targets

    • Target

      2024-01-10_7c2210ee2de3ef9d78f30f5a583e6248_virlock

    • Size

      253KB

    • MD5

      7c2210ee2de3ef9d78f30f5a583e6248

    • SHA1

      7a2489f19b5f80e0214eb681349667585bbc1f75

    • SHA256

      160b444f5fb6288d959e48ebd3270fb1eaae132136a5bb6b61415eccc9868820

    • SHA512

      ddc781a2c3f0f50e584ccd42a80e7f935036aa5fd830acbb804c9019ea9ed1fbd6a24c42796849aedb45e9db1ca3a4a2579b560e9bd98ce8dd3dd5bb0c9a5821

    • SSDEEP

      6144:GNbwT7wZ/u22bC4QhHIw155YR2cFkCuP61I7:GNkfwpt4QhHIw+RmNi27

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks