General

  • Target

    2024-03-14_a71d226d72e48af506a3ea73afb7af77_virlock

  • Size

    256KB

  • Sample

    240314-km2keafb9s

  • MD5

    a71d226d72e48af506a3ea73afb7af77

  • SHA1

    30b129d29de7aa6012e6e8edc47363cf9a7de2c0

  • SHA256

    96d4ea1db7bd568f036210f2d3718cd51c8cde23360918474a7fe5835430a76c

  • SHA512

    73a0e501df2c617074df6926cd09b1fa6499dc4ce5a7cb5d3bdeae51b1d1c08269be814cc980b0042e4921b3fbeab7feb95992d3d7218d5fbc369e6002d94044

  • SSDEEP

    3072:w/hHu8dqZNWEUdtzCbVig0O9AQU1FWTRWcRPLyMgQcDuu3Liyg0KBt:OkLWvdtgVirQmFsyJQ2uuLiZBt

Malware Config

Targets

    • Target

      2024-03-14_a71d226d72e48af506a3ea73afb7af77_virlock

    • Size

      256KB

    • MD5

      a71d226d72e48af506a3ea73afb7af77

    • SHA1

      30b129d29de7aa6012e6e8edc47363cf9a7de2c0

    • SHA256

      96d4ea1db7bd568f036210f2d3718cd51c8cde23360918474a7fe5835430a76c

    • SHA512

      73a0e501df2c617074df6926cd09b1fa6499dc4ce5a7cb5d3bdeae51b1d1c08269be814cc980b0042e4921b3fbeab7feb95992d3d7218d5fbc369e6002d94044

    • SSDEEP

      3072:w/hHu8dqZNWEUdtzCbVig0O9AQU1FWTRWcRPLyMgQcDuu3Liyg0KBt:OkLWvdtgVirQmFsyJQ2uuLiZBt

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (95) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks