General

  • Target

    2024-01-25_5204c4764b3e18a7df69e7fdf13e8b2a_virlock

  • Size

    139KB

  • Sample

    240125-3qw37saggj

  • MD5

    5204c4764b3e18a7df69e7fdf13e8b2a

  • SHA1

    ee27a45eeb52fbc167b1717dedb258fe2ebdd76a

  • SHA256

    d6c4b111cc47c88cd5589e38032354579280515ab867c2c121ad874d02e8fdd2

  • SHA512

    1006eaf3150e96514793ce9863cbe28136da9027da555a74774b6553ffb19e24dd524dd4695280977e69ad15103e3550478b4ea087439ae293a0ac456ddbe65e

  • SSDEEP

    3072:KP0hM6TmZZMPh4ohH9CddxJCyo1pq7pTSA23K1c0c1pfp558KO4yX:NhBaZZMp7H9CdGerIsc1pfp55DOD

Malware Config

Targets

    • Target

      2024-01-25_5204c4764b3e18a7df69e7fdf13e8b2a_virlock

    • Size

      139KB

    • MD5

      5204c4764b3e18a7df69e7fdf13e8b2a

    • SHA1

      ee27a45eeb52fbc167b1717dedb258fe2ebdd76a

    • SHA256

      d6c4b111cc47c88cd5589e38032354579280515ab867c2c121ad874d02e8fdd2

    • SHA512

      1006eaf3150e96514793ce9863cbe28136da9027da555a74774b6553ffb19e24dd524dd4695280977e69ad15103e3550478b4ea087439ae293a0ac456ddbe65e

    • SSDEEP

      3072:KP0hM6TmZZMPh4ohH9CddxJCyo1pq7pTSA23K1c0c1pfp558KO4yX:NhBaZZMp7H9CdGerIsc1pfp55DOD

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks