General

  • Target

    2024-03-12_3cca7981e5446a2b834dbfa3a5892067_virlock

  • Size

    140KB

  • Sample

    240312-g7qrvscd93

  • MD5

    3cca7981e5446a2b834dbfa3a5892067

  • SHA1

    2f6d22113abe12e8497c909b9c5ef05da38e6153

  • SHA256

    482b9e6ee6c4c1a2ff19520aa0f8d76d4c2e6bc56f3b189d9c40e9b3d28c5ec0

  • SHA512

    e80bb1f6e832c9c2c56bf8c7f830c65032314a40b422c7a43c5687ffccb4ebc3c287c2a8d476f50ff69cf5f0618bfdcf9ccf1b0e3b889a8ff3698234a7b5c8c4

  • SSDEEP

    3072:0ZPWJYiOXcqxuiQ0wbcS2Qqksya+lQnG+ZihjPCIBPHlYVX:hJycq9ZwbFqVya+wkhjPCItHlYp

Malware Config

Targets

    • Target

      2024-03-12_3cca7981e5446a2b834dbfa3a5892067_virlock

    • Size

      140KB

    • MD5

      3cca7981e5446a2b834dbfa3a5892067

    • SHA1

      2f6d22113abe12e8497c909b9c5ef05da38e6153

    • SHA256

      482b9e6ee6c4c1a2ff19520aa0f8d76d4c2e6bc56f3b189d9c40e9b3d28c5ec0

    • SHA512

      e80bb1f6e832c9c2c56bf8c7f830c65032314a40b422c7a43c5687ffccb4ebc3c287c2a8d476f50ff69cf5f0618bfdcf9ccf1b0e3b889a8ff3698234a7b5c8c4

    • SSDEEP

      3072:0ZPWJYiOXcqxuiQ0wbcS2Qqksya+lQnG+ZihjPCIBPHlYVX:hJycq9ZwbFqVya+wkhjPCItHlYp

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks