General

  • Target

    2024-02-19_947058fc6e134da475c97567d122a314_virlock

  • Size

    2.3MB

  • Sample

    240219-t8dvxaha48

  • MD5

    947058fc6e134da475c97567d122a314

  • SHA1

    91c9e5138e2c1afa705f6efe15fdf707e4086e88

  • SHA256

    80fbf482c4045c4b617f85b4e3db8897a236e07637af737aa520240841a9f169

  • SHA512

    ffbd16fbe5aeb009af9f37eb2c35bb1af721d5a6223567f0bc7012cb1d83347bcf3e731a757772f2983e019eb0d9a9ef5b17b4120df9e0e97626b315fcbbb6f8

  • SSDEEP

    24576:2+BQ/xzk2fuPSqbZED1BhVQy+ScRWeTAVZn+snUcmhKh5V9mLXpAMEittLZUq+Ai:25/KI2SltCRXTSxUcmPvbuqEG

Malware Config

Targets

    • Target

      2024-02-19_947058fc6e134da475c97567d122a314_virlock

    • Size

      2.3MB

    • MD5

      947058fc6e134da475c97567d122a314

    • SHA1

      91c9e5138e2c1afa705f6efe15fdf707e4086e88

    • SHA256

      80fbf482c4045c4b617f85b4e3db8897a236e07637af737aa520240841a9f169

    • SHA512

      ffbd16fbe5aeb009af9f37eb2c35bb1af721d5a6223567f0bc7012cb1d83347bcf3e731a757772f2983e019eb0d9a9ef5b17b4120df9e0e97626b315fcbbb6f8

    • SSDEEP

      24576:2+BQ/xzk2fuPSqbZED1BhVQy+ScRWeTAVZn+snUcmhKh5V9mLXpAMEittLZUq+Ai:25/KI2SltCRXTSxUcmPvbuqEG

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (74) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks