General

  • Target

    2024-01-11_ad70b458695b57ff51566934e03d93db_virlock

  • Size

    140KB

  • Sample

    240112-gsr2dahfhn

  • MD5

    ad70b458695b57ff51566934e03d93db

  • SHA1

    05adf2fa66282dca20f9d13c7407f26544394d31

  • SHA256

    ca4e968fbc381c5e874f6bb9e93d3e250ff58f2d3a9699bfb2180dae3db860a9

  • SHA512

    0aa2874742542c6a1bb54e3ca25db28403681a33dc8f3dae439b1e508a639f88cdb9e5859ac0401118b8895c0ebea27b281a2348d99bbcd3afe3db94c9d6016f

  • SSDEEP

    3072:yrB860WxT16zEVJnSrhZkRG2DUx1tQayp/in5W9X:IN0WN1hJAkB4PC/Oq

Malware Config

Targets

    • Target

      2024-01-11_ad70b458695b57ff51566934e03d93db_virlock

    • Size

      140KB

    • MD5

      ad70b458695b57ff51566934e03d93db

    • SHA1

      05adf2fa66282dca20f9d13c7407f26544394d31

    • SHA256

      ca4e968fbc381c5e874f6bb9e93d3e250ff58f2d3a9699bfb2180dae3db860a9

    • SHA512

      0aa2874742542c6a1bb54e3ca25db28403681a33dc8f3dae439b1e508a639f88cdb9e5859ac0401118b8895c0ebea27b281a2348d99bbcd3afe3db94c9d6016f

    • SSDEEP

      3072:yrB860WxT16zEVJnSrhZkRG2DUx1tQayp/in5W9X:IN0WN1hJAkB4PC/Oq

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks