General

  • Target

    2024-02-20_598356763a9110c33492e403bb49f0c8_virlock

  • Size

    164KB

  • Sample

    240220-gfaasscb5z

  • MD5

    598356763a9110c33492e403bb49f0c8

  • SHA1

    74ec55b6c7137d862c1d839ea201bba42810d5b1

  • SHA256

    d9ec345373079a5a7f0f1c230c71ff47684c8cb82d0ae91f3ccf77175f9625d3

  • SHA512

    f65f881b10b7d123cf9476ff1e84d4da73226907f1a3f8f83f7788fcfac1f687085a69ec48d3bed29517f1f57b1e5d9f3eb9ed6e1c4f27ebb99baa4f904436f2

  • SSDEEP

    3072:ihjaXOMt35FQngjVreIujwASn3Ay2onYanl04E6kgDxMiaGNI29az8npnVXzx:ihj0OMx5GngdHnh2oYSz7A2C8nj1

Malware Config

Targets

    • Target

      2024-02-20_598356763a9110c33492e403bb49f0c8_virlock

    • Size

      164KB

    • MD5

      598356763a9110c33492e403bb49f0c8

    • SHA1

      74ec55b6c7137d862c1d839ea201bba42810d5b1

    • SHA256

      d9ec345373079a5a7f0f1c230c71ff47684c8cb82d0ae91f3ccf77175f9625d3

    • SHA512

      f65f881b10b7d123cf9476ff1e84d4da73226907f1a3f8f83f7788fcfac1f687085a69ec48d3bed29517f1f57b1e5d9f3eb9ed6e1c4f27ebb99baa4f904436f2

    • SSDEEP

      3072:ihjaXOMt35FQngjVreIujwASn3Ay2onYanl04E6kgDxMiaGNI29az8npnVXzx:ihj0OMx5GngdHnh2oYSz7A2C8nj1

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (66) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks