Resubmissions

23/02/2024, 14:43

240223-r3j4macb71 10

23/02/2024, 14:22

240223-rp3ntaba29 10

23/02/2024, 11:10

240223-m9t5ysff63 10

General

  • Target

    2024-02-23_ead34dbd568dab561004d36d88990158_virlock

  • Size

    565KB

  • Sample

    240223-rp3ntaba29

  • MD5

    ead34dbd568dab561004d36d88990158

  • SHA1

    e2649906fb1b631a0b3795cfd6f853fdd3302cc5

  • SHA256

    43664f03b4fb5ceb748682c4c8313e45096405b9f6f6ae113d952d104d651736

  • SHA512

    dfaacb79888ed2c1af33e262208ac8015accc1dbbae4736d692282987b30b2b2edea18713183fa5380f69517775949d1e99c7cd2b8b2e19f22c1705134cf26ee

  • SSDEEP

    6144:IiQUcffBAhyFp02NOUzoShm4sddqsfcxxEEOVJ4ZujBLNZW5xbqh23fCcb/pr4:+hAhaZOaoShMwzxfHZ4BfWjbwItr4

Malware Config

Targets

    • Target

      2024-02-23_ead34dbd568dab561004d36d88990158_virlock

    • Size

      565KB

    • MD5

      ead34dbd568dab561004d36d88990158

    • SHA1

      e2649906fb1b631a0b3795cfd6f853fdd3302cc5

    • SHA256

      43664f03b4fb5ceb748682c4c8313e45096405b9f6f6ae113d952d104d651736

    • SHA512

      dfaacb79888ed2c1af33e262208ac8015accc1dbbae4736d692282987b30b2b2edea18713183fa5380f69517775949d1e99c7cd2b8b2e19f22c1705134cf26ee

    • SSDEEP

      6144:IiQUcffBAhyFp02NOUzoShm4sddqsfcxxEEOVJ4ZujBLNZW5xbqh23fCcb/pr4:+hAhaZOaoShMwzxfHZ4BfWjbwItr4

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (79) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks