General
-
Target
2024-01-10_7c2210ee2de3ef9d78f30f5a583e6248_virlock
-
Size
253KB
-
Sample
240111-gkvgjahge9
-
MD5
7c2210ee2de3ef9d78f30f5a583e6248
-
SHA1
7a2489f19b5f80e0214eb681349667585bbc1f75
-
SHA256
160b444f5fb6288d959e48ebd3270fb1eaae132136a5bb6b61415eccc9868820
-
SHA512
ddc781a2c3f0f50e584ccd42a80e7f935036aa5fd830acbb804c9019ea9ed1fbd6a24c42796849aedb45e9db1ca3a4a2579b560e9bd98ce8dd3dd5bb0c9a5821
-
SSDEEP
6144:GNbwT7wZ/u22bC4QhHIw155YR2cFkCuP61I7:GNkfwpt4QhHIw+RmNi27
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_7c2210ee2de3ef9d78f30f5a583e6248_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_7c2210ee2de3ef9d78f30f5a583e6248_virlock.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-10_7c2210ee2de3ef9d78f30f5a583e6248_virlock
-
Size
253KB
-
MD5
7c2210ee2de3ef9d78f30f5a583e6248
-
SHA1
7a2489f19b5f80e0214eb681349667585bbc1f75
-
SHA256
160b444f5fb6288d959e48ebd3270fb1eaae132136a5bb6b61415eccc9868820
-
SHA512
ddc781a2c3f0f50e584ccd42a80e7f935036aa5fd830acbb804c9019ea9ed1fbd6a24c42796849aedb45e9db1ca3a4a2579b560e9bd98ce8dd3dd5bb0c9a5821
-
SSDEEP
6144:GNbwT7wZ/u22bC4QhHIw155YR2cFkCuP61I7:GNkfwpt4QhHIw+RmNi27
Score10/10-
Modifies visibility of file extensions in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1