General
-
Target
2024-03-14_a71d226d72e48af506a3ea73afb7af77_virlock
-
Size
256KB
-
Sample
240314-km2keafb9s
-
MD5
a71d226d72e48af506a3ea73afb7af77
-
SHA1
30b129d29de7aa6012e6e8edc47363cf9a7de2c0
-
SHA256
96d4ea1db7bd568f036210f2d3718cd51c8cde23360918474a7fe5835430a76c
-
SHA512
73a0e501df2c617074df6926cd09b1fa6499dc4ce5a7cb5d3bdeae51b1d1c08269be814cc980b0042e4921b3fbeab7feb95992d3d7218d5fbc369e6002d94044
-
SSDEEP
3072:w/hHu8dqZNWEUdtzCbVig0O9AQU1FWTRWcRPLyMgQcDuu3Liyg0KBt:OkLWvdtgVirQmFsyJQ2uuLiZBt
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_a71d226d72e48af506a3ea73afb7af77_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_a71d226d72e48af506a3ea73afb7af77_virlock.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-14_a71d226d72e48af506a3ea73afb7af77_virlock
-
Size
256KB
-
MD5
a71d226d72e48af506a3ea73afb7af77
-
SHA1
30b129d29de7aa6012e6e8edc47363cf9a7de2c0
-
SHA256
96d4ea1db7bd568f036210f2d3718cd51c8cde23360918474a7fe5835430a76c
-
SHA512
73a0e501df2c617074df6926cd09b1fa6499dc4ce5a7cb5d3bdeae51b1d1c08269be814cc980b0042e4921b3fbeab7feb95992d3d7218d5fbc369e6002d94044
-
SSDEEP
3072:w/hHu8dqZNWEUdtzCbVig0O9AQU1FWTRWcRPLyMgQcDuu3Liyg0KBt:OkLWvdtgVirQmFsyJQ2uuLiZBt
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (95) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1