General

  • Target

    2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock

  • Size

    163KB

  • Sample

    240213-wcyasaec5w

  • MD5

    570b3eeade0b3f10847a0ae04c1f267d

  • SHA1

    1116a61f810739bd69df1f27df5d9bf3b296476a

  • SHA256

    f03d6a18cea63b214de796020c39dc757fb3a6066d7309da20441b0b57491ea1

  • SHA512

    564e8d539dde5baa694309db34620ec3a96f3b5996948a5d5760cdd120b583024966afefa9df28b404a2c6024950eadfa5f5c6eda7eeb4ab50e0c61353bbdd41

  • SSDEEP

    3072:NHC6dX5yKPFQ3hyikKIBOK46+veMHDVfEEnH6KCtZkRjrPctkr1rzwExFVZvWwxK:NH9X57P24ikKi+veYVXGtZ7KpzwEbVZ6

Malware Config

Targets

    • Target

      2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock

    • Size

      163KB

    • MD5

      570b3eeade0b3f10847a0ae04c1f267d

    • SHA1

      1116a61f810739bd69df1f27df5d9bf3b296476a

    • SHA256

      f03d6a18cea63b214de796020c39dc757fb3a6066d7309da20441b0b57491ea1

    • SHA512

      564e8d539dde5baa694309db34620ec3a96f3b5996948a5d5760cdd120b583024966afefa9df28b404a2c6024950eadfa5f5c6eda7eeb4ab50e0c61353bbdd41

    • SSDEEP

      3072:NHC6dX5yKPFQ3hyikKIBOK46+veMHDVfEEnH6KCtZkRjrPctkr1rzwExFVZvWwxK:NH9X57P24ikKi+veYVXGtZ7KpzwEbVZ6

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (85) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks