General

  • Target

    2024-01-24_0d57b9da9c66ffe6a9b9a789e0d2a00e_virlock

  • Size

    139KB

  • Sample

    240124-sdw8bsdbbl

  • MD5

    0d57b9da9c66ffe6a9b9a789e0d2a00e

  • SHA1

    eef9e19f448c862faf83ff7efd25decd05af2ca8

  • SHA256

    8ae6dac100523652efee57ef5501f247919f3ef98e522a3d3cdf90dc6b12f97e

  • SHA512

    8f5dd0dccc2b9a47489ae73755fd18f28b9aea6905d91e61c5917cb9a3c4b510840d3c16b44a8a33a0cf967e154b49b342cf2a042b279469e3fd2c5bdbbd78df

  • SSDEEP

    3072:N2Xfstr1Zcyfh2Xzkqj95p77NxobN5lueCTRp7KX:uMDsn97hxYmY

Malware Config

Targets

    • Target

      2024-01-24_0d57b9da9c66ffe6a9b9a789e0d2a00e_virlock

    • Size

      139KB

    • MD5

      0d57b9da9c66ffe6a9b9a789e0d2a00e

    • SHA1

      eef9e19f448c862faf83ff7efd25decd05af2ca8

    • SHA256

      8ae6dac100523652efee57ef5501f247919f3ef98e522a3d3cdf90dc6b12f97e

    • SHA512

      8f5dd0dccc2b9a47489ae73755fd18f28b9aea6905d91e61c5917cb9a3c4b510840d3c16b44a8a33a0cf967e154b49b342cf2a042b279469e3fd2c5bdbbd78df

    • SSDEEP

      3072:N2Xfstr1Zcyfh2Xzkqj95p77NxobN5lueCTRp7KX:uMDsn97hxYmY

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks