General

  • Target

    2024-02-28_88ee1997507f910de70ab4a25802e98d_virlock

  • Size

    716KB

  • Sample

    240228-lxwycagg4s

  • MD5

    88ee1997507f910de70ab4a25802e98d

  • SHA1

    7d17e36c0b2c03a503ce2b8a1ec4f2ed65650d6e

  • SHA256

    56c736e942e548d86b5b1d3d1a4ab21f91d2a51f0ce03029dcddee2a6320edbb

  • SHA512

    4e7763200713ab2a6c510a349cba824ea6c985611f1761812fa3f0208c01cc76321e4db168d6265e94b37f6cdc2d2661a9974da421369ddb7e4887a684e1677f

  • SSDEEP

    12288:KuCXo2va/fCDHrZ4icjWCAh/Zpkj06VCHAjXZS/XY8x9UO6dWl+bG2wsUL2NpDiH:lIT86LSno/Zp+MQpIx9B4isy2NDc

Malware Config

Targets

    • Target

      2024-02-28_88ee1997507f910de70ab4a25802e98d_virlock

    • Size

      716KB

    • MD5

      88ee1997507f910de70ab4a25802e98d

    • SHA1

      7d17e36c0b2c03a503ce2b8a1ec4f2ed65650d6e

    • SHA256

      56c736e942e548d86b5b1d3d1a4ab21f91d2a51f0ce03029dcddee2a6320edbb

    • SHA512

      4e7763200713ab2a6c510a349cba824ea6c985611f1761812fa3f0208c01cc76321e4db168d6265e94b37f6cdc2d2661a9974da421369ddb7e4887a684e1677f

    • SSDEEP

      12288:KuCXo2va/fCDHrZ4icjWCAh/Zpkj06VCHAjXZS/XY8x9UO6dWl+bG2wsUL2NpDiH:lIT86LSno/Zp+MQpIx9B4isy2NDc

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (85) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks