Resubmissions

23-02-2024 11:52

240223-n1sffafh85 10

23-02-2024 11:35

240223-np4dkafd3x 10

General

  • Target

    2024-02-23_ae20f99045614604311b948f21bd05b9_virlock

  • Size

    206KB

  • Sample

    240223-n1sffafh85

  • MD5

    ae20f99045614604311b948f21bd05b9

  • SHA1

    4ab0bbe3f9f7669cc1a359af1136c34af63ecda7

  • SHA256

    01586d4e1494fcc1b71274863a62813802fbb09f08169414c112738b53cebfc0

  • SHA512

    70243530957499fa4698a39c8b26b300650cd2c6e65e8d173a0ad7098440d182f1417e757dcb35088651d9c39a774cea597cf25857f7c4b2cf60b2f8320cebd3

  • SSDEEP

    6144:umvl12Ml/2q/nCrYTfpjV4SJdKIZN6KR:Fvl11/xnAYpPKY6

Malware Config

Targets

    • Target

      2024-02-23_ae20f99045614604311b948f21bd05b9_virlock

    • Size

      206KB

    • MD5

      ae20f99045614604311b948f21bd05b9

    • SHA1

      4ab0bbe3f9f7669cc1a359af1136c34af63ecda7

    • SHA256

      01586d4e1494fcc1b71274863a62813802fbb09f08169414c112738b53cebfc0

    • SHA512

      70243530957499fa4698a39c8b26b300650cd2c6e65e8d173a0ad7098440d182f1417e757dcb35088651d9c39a774cea597cf25857f7c4b2cf60b2f8320cebd3

    • SSDEEP

      6144:umvl12Ml/2q/nCrYTfpjV4SJdKIZN6KR:Fvl11/xnAYpPKY6

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (82) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks