General

  • Target

    2024-03-05_e39232e5ec6244ba0ca76b561b24b988_virlock

  • Size

    564KB

  • Sample

    240305-s48daabd22

  • MD5

    e39232e5ec6244ba0ca76b561b24b988

  • SHA1

    57a19ed1f6ac1f701caaa80471e31e6923d7d401

  • SHA256

    74b56eeb464c938207d078cd1b7c30c405847973087233df7da01cec6bc25698

  • SHA512

    2dddcf6491a1c4311b6962a6b0cb5efb30d2567ef719008a6353fad250b26d36a9fbfeab312a95272ed305f35f1e98d2f7f4fbd28fd2552b9c67a5e5325f4160

  • SSDEEP

    12288:mWMOOw7z+uDqUrafOXqjwpPavsx7kT89zO0M:TMsOadXYwB2G7Gx

Malware Config

Targets

    • Target

      2024-03-05_e39232e5ec6244ba0ca76b561b24b988_virlock

    • Size

      564KB

    • MD5

      e39232e5ec6244ba0ca76b561b24b988

    • SHA1

      57a19ed1f6ac1f701caaa80471e31e6923d7d401

    • SHA256

      74b56eeb464c938207d078cd1b7c30c405847973087233df7da01cec6bc25698

    • SHA512

      2dddcf6491a1c4311b6962a6b0cb5efb30d2567ef719008a6353fad250b26d36a9fbfeab312a95272ed305f35f1e98d2f7f4fbd28fd2552b9c67a5e5325f4160

    • SSDEEP

      12288:mWMOOw7z+uDqUrafOXqjwpPavsx7kT89zO0M:TMsOadXYwB2G7Gx

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks