General

  • Target

    2024-01-25_0c41ed3a6bbfc41abac5a2d03f2053d1_virlock

  • Size

    186KB

  • Sample

    240125-vxyllsbee6

  • MD5

    0c41ed3a6bbfc41abac5a2d03f2053d1

  • SHA1

    458dd5fa9e0ca9d3d713774cd2de7222efca3d25

  • SHA256

    be44f2df177b64dc3cd57d8efed963bd1450842d1935383e96d2f9e10c210f58

  • SHA512

    567b736b5775c22a51b84bc4bcec692ecb41a3adce0df59ebc88d85939053e29350def34206194596810129f486915ccd4cd8a5b7843636affdaec749d6b390d

  • SSDEEP

    3072:0/O28DNAp3AvDjnwn1KzF6UM+W/I44HtKNxXSK06RHW8E2UXEkC/Onaf5sySAYAX:0/O28O+7jnw1KzF6UM+tfwfl06RHW8E4

Malware Config

Targets

    • Target

      2024-01-25_0c41ed3a6bbfc41abac5a2d03f2053d1_virlock

    • Size

      186KB

    • MD5

      0c41ed3a6bbfc41abac5a2d03f2053d1

    • SHA1

      458dd5fa9e0ca9d3d713774cd2de7222efca3d25

    • SHA256

      be44f2df177b64dc3cd57d8efed963bd1450842d1935383e96d2f9e10c210f58

    • SHA512

      567b736b5775c22a51b84bc4bcec692ecb41a3adce0df59ebc88d85939053e29350def34206194596810129f486915ccd4cd8a5b7843636affdaec749d6b390d

    • SSDEEP

      3072:0/O28DNAp3AvDjnwn1KzF6UM+W/I44HtKNxXSK06RHW8E2UXEkC/Onaf5sySAYAX:0/O28O+7jnw1KzF6UM+tfwfl06RHW8E4

    • Kinsing

      Kinsing is a loader written in Golang.

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (52) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks