General
-
Target
2024-01-11_ad70b458695b57ff51566934e03d93db_virlock
-
Size
140KB
-
Sample
240112-gsr2dahfhn
-
MD5
ad70b458695b57ff51566934e03d93db
-
SHA1
05adf2fa66282dca20f9d13c7407f26544394d31
-
SHA256
ca4e968fbc381c5e874f6bb9e93d3e250ff58f2d3a9699bfb2180dae3db860a9
-
SHA512
0aa2874742542c6a1bb54e3ca25db28403681a33dc8f3dae439b1e508a639f88cdb9e5859ac0401118b8895c0ebea27b281a2348d99bbcd3afe3db94c9d6016f
-
SSDEEP
3072:yrB860WxT16zEVJnSrhZkRG2DUx1tQayp/in5W9X:IN0WN1hJAkB4PC/Oq
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_ad70b458695b57ff51566934e03d93db_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_ad70b458695b57ff51566934e03d93db_virlock.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-11_ad70b458695b57ff51566934e03d93db_virlock
-
Size
140KB
-
MD5
ad70b458695b57ff51566934e03d93db
-
SHA1
05adf2fa66282dca20f9d13c7407f26544394d31
-
SHA256
ca4e968fbc381c5e874f6bb9e93d3e250ff58f2d3a9699bfb2180dae3db860a9
-
SHA512
0aa2874742542c6a1bb54e3ca25db28403681a33dc8f3dae439b1e508a639f88cdb9e5859ac0401118b8895c0ebea27b281a2348d99bbcd3afe3db94c9d6016f
-
SSDEEP
3072:yrB860WxT16zEVJnSrhZkRG2DUx1tQayp/in5W9X:IN0WN1hJAkB4PC/Oq
Score10/10-
Modifies visibility of file extensions in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1