General

  • Target

    2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock

  • Size

    213KB

  • Sample

    240125-v7ld2acgcm

  • MD5

    ce621c0a61fa467b80d3942f722fecab

  • SHA1

    6ce0db0be9eae2b928220c7d54d6c4b1a998380c

  • SHA256

    91c0b5030b319793a7ec551dcdd9859ddb32e399b042db90ff11fc71d108a48e

  • SHA512

    c22f97d586164ed5e47cbdc6bacbbc74b80a0d3500194550ff8e56493c89ca0fd2782c030a508b9037de8d639c4420c67a2e6bd13cd4f35290cc21ed2b43d4d2

  • SSDEEP

    6144:0/a2LZw/RPf6t8DFBoHx9kpqTEWp4hhF5jQ0ig1N7XG7B9OjZN:3xPfC8yg1N72FAjP

Malware Config

Targets

    • Target

      2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock

    • Size

      213KB

    • MD5

      ce621c0a61fa467b80d3942f722fecab

    • SHA1

      6ce0db0be9eae2b928220c7d54d6c4b1a998380c

    • SHA256

      91c0b5030b319793a7ec551dcdd9859ddb32e399b042db90ff11fc71d108a48e

    • SHA512

      c22f97d586164ed5e47cbdc6bacbbc74b80a0d3500194550ff8e56493c89ca0fd2782c030a508b9037de8d639c4420c67a2e6bd13cd4f35290cc21ed2b43d4d2

    • SSDEEP

      6144:0/a2LZw/RPf6t8DFBoHx9kpqTEWp4hhF5jQ0ig1N7XG7B9OjZN:3xPfC8yg1N72FAjP

    • Kinsing

      Kinsing is a loader written in Golang.

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (80) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks