General
-
Target
2024-01-25_a4396d5a9e6a31e5116c75ed8445a710_virlock
-
Size
213KB
-
Sample
240125-v5damsbgd8
-
MD5
a4396d5a9e6a31e5116c75ed8445a710
-
SHA1
eab2c89654a5c3953ae54aec2709325b3cdf5e97
-
SHA256
084c98843a6c5ef5db7af05b162b448a91d3eeb441936a40c60bf59eab1ab4d3
-
SHA512
795687a36d1f5c68727ded5ed66d1ac9de37c93ee1a8098f4dfea09420f8665e70b329eefde0922748c9393bac9e0e4da27757e46ed1aebad026ec33ed6f26cb
-
SSDEEP
6144:Pj79Ib17HfGLOF/QjvVbSgPKK7xxUjR3mB9ppVGPcN:r79K7HfGL7Px7xx0tmB9C+
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_a4396d5a9e6a31e5116c75ed8445a710_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_a4396d5a9e6a31e5116c75ed8445a710_virlock.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-25_a4396d5a9e6a31e5116c75ed8445a710_virlock
-
Size
213KB
-
MD5
a4396d5a9e6a31e5116c75ed8445a710
-
SHA1
eab2c89654a5c3953ae54aec2709325b3cdf5e97
-
SHA256
084c98843a6c5ef5db7af05b162b448a91d3eeb441936a40c60bf59eab1ab4d3
-
SHA512
795687a36d1f5c68727ded5ed66d1ac9de37c93ee1a8098f4dfea09420f8665e70b329eefde0922748c9393bac9e0e4da27757e46ed1aebad026ec33ed6f26cb
-
SSDEEP
6144:Pj79Ib17HfGLOF/QjvVbSgPKK7xxUjR3mB9ppVGPcN:r79K7HfGL7Px7xx0tmB9C+
-
Modifies visibility of file extensions in Explorer
-
Renames multiple (79) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1