General

  • Target

    2024-03-13_f55766f6bfe098743683be41e5f21fba_virlock

  • Size

    569KB

  • Sample

    240313-zkm2kaae23

  • MD5

    f55766f6bfe098743683be41e5f21fba

  • SHA1

    6cf99e83c6e930021e1c0738db6af2958cbb42d9

  • SHA256

    415940be04421d0465fb00a9b26e31a50aa36acf75e5a191c240d001de971be2

  • SHA512

    f562be655b610a502b22dfac655d00b8b8d8c9efbc8fc0e2609ab6aa2923f5274384518d7ed7022eab8079f7efd2d10b9dd35cc42a219531f010fc6a574b308f

  • SSDEEP

    12288:yju+pBWcmxHeAPphWiXEx7jCj5jnzw1APqhFtqZ:yNWcmNeAPpgCN9Pq1qZ

Malware Config

Targets

    • Target

      2024-03-13_f55766f6bfe098743683be41e5f21fba_virlock

    • Size

      569KB

    • MD5

      f55766f6bfe098743683be41e5f21fba

    • SHA1

      6cf99e83c6e930021e1c0738db6af2958cbb42d9

    • SHA256

      415940be04421d0465fb00a9b26e31a50aa36acf75e5a191c240d001de971be2

    • SHA512

      f562be655b610a502b22dfac655d00b8b8d8c9efbc8fc0e2609ab6aa2923f5274384518d7ed7022eab8079f7efd2d10b9dd35cc42a219531f010fc6a574b308f

    • SSDEEP

      12288:yju+pBWcmxHeAPphWiXEx7jCj5jnzw1APqhFtqZ:yNWcmNeAPpgCN9Pq1qZ

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (82) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks