General

  • Target

    2024-03-07_f0eaa77f880bf9735ebfb08ac74fd354_virlock

  • Size

    569KB

  • Sample

    240307-kc4l1sge4x

  • MD5

    f0eaa77f880bf9735ebfb08ac74fd354

  • SHA1

    a6a647c0af1c1630ff27dc0dfe8722db2da84526

  • SHA256

    2bf2ae91a0eb69f83bb93ae64893d7f824902cf9d16a3928aa8bd973927f328e

  • SHA512

    8db57e287209cf9d67a20638c28e2dd53633f19c6c1391af9de5caffdd594721579a1cb31771595899832e2f278a1bbd125a384a83cfe4257413a483c4117a42

  • SSDEEP

    12288:xkxX/591Oaw3szC+twVSob/g3QgciZnXzjUT169R02cgwg6e:xkxXPfwKBSMorgrcyWC2e

Malware Config

Targets

    • Target

      2024-03-07_f0eaa77f880bf9735ebfb08ac74fd354_virlock

    • Size

      569KB

    • MD5

      f0eaa77f880bf9735ebfb08ac74fd354

    • SHA1

      a6a647c0af1c1630ff27dc0dfe8722db2da84526

    • SHA256

      2bf2ae91a0eb69f83bb93ae64893d7f824902cf9d16a3928aa8bd973927f328e

    • SHA512

      8db57e287209cf9d67a20638c28e2dd53633f19c6c1391af9de5caffdd594721579a1cb31771595899832e2f278a1bbd125a384a83cfe4257413a483c4117a42

    • SSDEEP

      12288:xkxX/591Oaw3szC+twVSob/g3QgciZnXzjUT169R02cgwg6e:xkxXPfwKBSMorgrcyWC2e

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks