General

  • Target

    2024-01-25_24ceccc92f50e394e1af4c22a18d4d45_virlock

  • Size

    181KB

  • Sample

    240125-dxltdafbe3

  • MD5

    24ceccc92f50e394e1af4c22a18d4d45

  • SHA1

    cdc29850c24c092a114801159fefd6f3c44f47ba

  • SHA256

    78a434ab43ed79896e21785a18eeb8352566d65673db7f5f9a7e8339a1096aa3

  • SHA512

    6884263c4d6b7ba422fd3cd675e30305b45038280d20519c9bc0c8ca8ce97ef505434348bd60e69d0ceb8a9a42ec659939f4458b196ef25ac5cff1e91debe4d2

  • SSDEEP

    3072:aTpf7of8QrUdgYmgpcFM+Cq7Z/fKlnsK86E0UwUNZOztY8OiaxzuaamU+70vwZZb:aT1AjYgYmgpcFYq7Z/yZ5M8Oi6CaaITb

Malware Config

Targets

    • Target

      2024-01-25_24ceccc92f50e394e1af4c22a18d4d45_virlock

    • Size

      181KB

    • MD5

      24ceccc92f50e394e1af4c22a18d4d45

    • SHA1

      cdc29850c24c092a114801159fefd6f3c44f47ba

    • SHA256

      78a434ab43ed79896e21785a18eeb8352566d65673db7f5f9a7e8339a1096aa3

    • SHA512

      6884263c4d6b7ba422fd3cd675e30305b45038280d20519c9bc0c8ca8ce97ef505434348bd60e69d0ceb8a9a42ec659939f4458b196ef25ac5cff1e91debe4d2

    • SSDEEP

      3072:aTpf7of8QrUdgYmgpcFM+Cq7Z/fKlnsK86E0UwUNZOztY8OiaxzuaamU+70vwZZb:aT1AjYgYmgpcFYq7Z/yZ5M8Oi6CaaITb

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (87) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks