General

  • Target

    2024-02-12_8649f0822738456c7f9e33fa5287a993_virlock

  • Size

    254KB

  • Sample

    240212-w36d3sah7t

  • MD5

    8649f0822738456c7f9e33fa5287a993

  • SHA1

    e71ed54ee93ee969a904aaa4efa219ba772e697e

  • SHA256

    551c4664f1a8fe02a25248bb937cdb401be995ed70fe980fa436ea5cd612d294

  • SHA512

    7c39f90b01c06538da7c9ae3c64fdb872196fae3768992e2d720310096c2560e05d2da788c45231910f1a9e84684f0c317f3c962b7105701d3fe004c882c2e31

  • SSDEEP

    3072:oiWWKk+5/Do8tCTqyn62FQuhLWPsKK2oUcDnlTMNof:oiWWKk+5/D/CTqy6yQtPpcDlTMNof

Malware Config

Targets

    • Target

      2024-02-12_8649f0822738456c7f9e33fa5287a993_virlock

    • Size

      254KB

    • MD5

      8649f0822738456c7f9e33fa5287a993

    • SHA1

      e71ed54ee93ee969a904aaa4efa219ba772e697e

    • SHA256

      551c4664f1a8fe02a25248bb937cdb401be995ed70fe980fa436ea5cd612d294

    • SHA512

      7c39f90b01c06538da7c9ae3c64fdb872196fae3768992e2d720310096c2560e05d2da788c45231910f1a9e84684f0c317f3c962b7105701d3fe004c882c2e31

    • SSDEEP

      3072:oiWWKk+5/Do8tCTqyn62FQuhLWPsKK2oUcDnlTMNof:oiWWKk+5/D/CTqy6yQtPpcDlTMNof

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (77) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks