General

  • Target

    2024-03-07_21c6668b742da8f37daf73c866438c25_virlock

  • Size

    117KB

  • Sample

    240307-w2b4vaad34

  • MD5

    21c6668b742da8f37daf73c866438c25

  • SHA1

    8791036b5376a0e00fbfadf8ff6cbb2f7c890cb3

  • SHA256

    4a69753b4a4f7aaedf6398a20ee08d6f31c1f71933ee96aca671bc2711cf0a4c

  • SHA512

    3c68be2afbc04c460c4b137fe35ec18c1f75748ac8c261724f6e5996779fb00a5c5565eaaa83fe0e87687aa618b49988f37b7c03299bfce6f7647a28bb70a251

  • SSDEEP

    1536:2HBb8I2gqPCwyj6G3XrWcTu1uZsHkxAvn5sCX4l+kZjGW8GWjI+IxgwWeGVuprg:cBYhEOGnrMMGEe/iPlHKGsIlCwgupt1

Malware Config

Targets

    • Target

      2024-03-07_21c6668b742da8f37daf73c866438c25_virlock

    • Size

      117KB

    • MD5

      21c6668b742da8f37daf73c866438c25

    • SHA1

      8791036b5376a0e00fbfadf8ff6cbb2f7c890cb3

    • SHA256

      4a69753b4a4f7aaedf6398a20ee08d6f31c1f71933ee96aca671bc2711cf0a4c

    • SHA512

      3c68be2afbc04c460c4b137fe35ec18c1f75748ac8c261724f6e5996779fb00a5c5565eaaa83fe0e87687aa618b49988f37b7c03299bfce6f7647a28bb70a251

    • SSDEEP

      1536:2HBb8I2gqPCwyj6G3XrWcTu1uZsHkxAvn5sCX4l+kZjGW8GWjI+IxgwWeGVuprg:cBYhEOGnrMMGEe/iPlHKGsIlCwgupt1

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (91) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks