General

  • Target

    2024-02-22_0c5c9b7b431fafd46ae05e7b90fcf739_virlock

  • Size

    139KB

  • Sample

    240222-w2ak1sea83

  • MD5

    0c5c9b7b431fafd46ae05e7b90fcf739

  • SHA1

    9a5cffc7bf2b1ffe2169c4212617d66760498140

  • SHA256

    d9b48a00e1e2cf7bec8a296c2d59cdbb7dea4c6a390367ac8b1adf44024b2cfe

  • SHA512

    10059f4203864c83eb94844d7fb2d4fa1d56a03d37249bcd212649f7c7e586e7fbe55eafd3f29fc2b7be2f2e827622ff41bc6f28bab7368d95e22ec9638c25bf

  • SSDEEP

    3072:eLdenQT98muWkVm1BZAOpCNRIxq16E27ayo29GUDoF1v:A4nQTe7Urp4wGUDoP

Malware Config

Targets

    • Target

      2024-02-22_0c5c9b7b431fafd46ae05e7b90fcf739_virlock

    • Size

      139KB

    • MD5

      0c5c9b7b431fafd46ae05e7b90fcf739

    • SHA1

      9a5cffc7bf2b1ffe2169c4212617d66760498140

    • SHA256

      d9b48a00e1e2cf7bec8a296c2d59cdbb7dea4c6a390367ac8b1adf44024b2cfe

    • SHA512

      10059f4203864c83eb94844d7fb2d4fa1d56a03d37249bcd212649f7c7e586e7fbe55eafd3f29fc2b7be2f2e827622ff41bc6f28bab7368d95e22ec9638c25bf

    • SSDEEP

      3072:eLdenQT98muWkVm1BZAOpCNRIxq16E27ayo29GUDoF1v:A4nQTe7Urp4wGUDoP

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (87) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks