General

  • Target

    2024-02-13_bbd7ef37db7c08e27f51969de68eadd1_virlock

  • Size

    567KB

  • Sample

    240213-swytwadf27

  • MD5

    bbd7ef37db7c08e27f51969de68eadd1

  • SHA1

    66872d76e3f98f84f25bfb5072b75a2ed5207dea

  • SHA256

    454b33fc0aa8657e7773ed4e6f5a6bfa63f7de86e1eb9f091f8e9df0a3734f7c

  • SHA512

    a2d35fa15f08e71728f86d6f3e7a530e00f2c18fe966b64de63987095d0b43808643965b66f6c70a6c6bfcf4e28b1d5b14d5e25eb9c45505269b13ceca9e80ec

  • SSDEEP

    12288:SWTSqytdEuAX5XxCtdQ2qYorxPnzd4xpLcsyrmwGqTd:SC/6ipcbOY48aSLqTd

Malware Config

Targets

    • Target

      2024-02-13_bbd7ef37db7c08e27f51969de68eadd1_virlock

    • Size

      567KB

    • MD5

      bbd7ef37db7c08e27f51969de68eadd1

    • SHA1

      66872d76e3f98f84f25bfb5072b75a2ed5207dea

    • SHA256

      454b33fc0aa8657e7773ed4e6f5a6bfa63f7de86e1eb9f091f8e9df0a3734f7c

    • SHA512

      a2d35fa15f08e71728f86d6f3e7a530e00f2c18fe966b64de63987095d0b43808643965b66f6c70a6c6bfcf4e28b1d5b14d5e25eb9c45505269b13ceca9e80ec

    • SSDEEP

      12288:SWTSqytdEuAX5XxCtdQ2qYorxPnzd4xpLcsyrmwGqTd:SC/6ipcbOY48aSLqTd

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks