General

  • Target

    2024-02-14_942368da8efe2ae87d1c0c61705f306e_virlock

  • Size

    253KB

  • Sample

    240214-xkd3jsac8s

  • MD5

    942368da8efe2ae87d1c0c61705f306e

  • SHA1

    52c59f257cf68a3ed5bfdb8b58ab2fc4d81c625b

  • SHA256

    3e04e01fd0ccef774436ec8d449481cf3aef78e290a45ae2d4cea76d167cf64b

  • SHA512

    e0303e3e014e9f9aec9c9e9f5ba5468040c8351943a602f22cdb5eea8238fd53c7dbce282c8757ff9fbd05fadc6a93ed195e45616e83fd57f50d646e988e6d7d

  • SSDEEP

    3072:5L21Ze0Zw9CoKqcZMMufLTjuDGrh6GyqQ8GCCizsxgU2:5LaZe0uKqcGGDS6GyqQPCU2

Malware Config

Targets

    • Target

      2024-02-14_942368da8efe2ae87d1c0c61705f306e_virlock

    • Size

      253KB

    • MD5

      942368da8efe2ae87d1c0c61705f306e

    • SHA1

      52c59f257cf68a3ed5bfdb8b58ab2fc4d81c625b

    • SHA256

      3e04e01fd0ccef774436ec8d449481cf3aef78e290a45ae2d4cea76d167cf64b

    • SHA512

      e0303e3e014e9f9aec9c9e9f5ba5468040c8351943a602f22cdb5eea8238fd53c7dbce282c8757ff9fbd05fadc6a93ed195e45616e83fd57f50d646e988e6d7d

    • SSDEEP

      3072:5L21Ze0Zw9CoKqcZMMufLTjuDGrh6GyqQ8GCCizsxgU2:5LaZe0uKqcGGDS6GyqQPCU2

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (74) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks