General
-
Target
2024-01-18_85aebf4828ff18dd7db4703866283312_virlock
-
Size
215KB
-
Sample
240118-2zjnssefa7
-
MD5
85aebf4828ff18dd7db4703866283312
-
SHA1
2bb71b280af8e4fd8456c0b83308f3e0cba2fe82
-
SHA256
c40f3c136f0b08335a0e1b53020af755e25672df3292050227e276c298f51f47
-
SHA512
1c3f07b3143d3c39bb8776f57356af0bbea9d547701b62be4125920e5af4e236493415c9447098624f91f426874ef2b6e22f84038f1ce96e0bb8942cd7d199a0
-
SSDEEP
6144:xUdVDqkrXvEAmnDrwQpvE9ZeyqNRDAUMGVGiQ8Cyo3:x4Jr/XeDMQpvE9ZbqNRAlGVGsCyQ
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_85aebf4828ff18dd7db4703866283312_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_85aebf4828ff18dd7db4703866283312_virlock.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-18_85aebf4828ff18dd7db4703866283312_virlock
-
Size
215KB
-
MD5
85aebf4828ff18dd7db4703866283312
-
SHA1
2bb71b280af8e4fd8456c0b83308f3e0cba2fe82
-
SHA256
c40f3c136f0b08335a0e1b53020af755e25672df3292050227e276c298f51f47
-
SHA512
1c3f07b3143d3c39bb8776f57356af0bbea9d547701b62be4125920e5af4e236493415c9447098624f91f426874ef2b6e22f84038f1ce96e0bb8942cd7d199a0
-
SSDEEP
6144:xUdVDqkrXvEAmnDrwQpvE9ZeyqNRDAUMGVGiQ8Cyo3:x4Jr/XeDMQpvE9ZbqNRAlGVGsCyQ
Score10/10-
Modifies visibility of file extensions in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1