General
-
Target
2024-02-19_947058fc6e134da475c97567d122a314_virlock
-
Size
2.3MB
-
Sample
240219-t8dvxaha48
-
MD5
947058fc6e134da475c97567d122a314
-
SHA1
91c9e5138e2c1afa705f6efe15fdf707e4086e88
-
SHA256
80fbf482c4045c4b617f85b4e3db8897a236e07637af737aa520240841a9f169
-
SHA512
ffbd16fbe5aeb009af9f37eb2c35bb1af721d5a6223567f0bc7012cb1d83347bcf3e731a757772f2983e019eb0d9a9ef5b17b4120df9e0e97626b315fcbbb6f8
-
SSDEEP
24576:2+BQ/xzk2fuPSqbZED1BhVQy+ScRWeTAVZn+snUcmhKh5V9mLXpAMEittLZUq+Ai:25/KI2SltCRXTSxUcmPvbuqEG
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_947058fc6e134da475c97567d122a314_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_947058fc6e134da475c97567d122a314_virlock.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-19_947058fc6e134da475c97567d122a314_virlock
-
Size
2.3MB
-
MD5
947058fc6e134da475c97567d122a314
-
SHA1
91c9e5138e2c1afa705f6efe15fdf707e4086e88
-
SHA256
80fbf482c4045c4b617f85b4e3db8897a236e07637af737aa520240841a9f169
-
SHA512
ffbd16fbe5aeb009af9f37eb2c35bb1af721d5a6223567f0bc7012cb1d83347bcf3e731a757772f2983e019eb0d9a9ef5b17b4120df9e0e97626b315fcbbb6f8
-
SSDEEP
24576:2+BQ/xzk2fuPSqbZED1BhVQy+ScRWeTAVZn+snUcmhKh5V9mLXpAMEittLZUq+Ai:25/KI2SltCRXTSxUcmPvbuqEG
Score10/10-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Renames multiple (74) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1