General

  • Target

    2024-03-15_5f33b06ad4178ae57a6983f629d5f4a3_virlock

  • Size

    253KB

  • Sample

    240315-d1f3ashd34

  • MD5

    5f33b06ad4178ae57a6983f629d5f4a3

  • SHA1

    91a509907e9f1ed27b7152823141dedb42d4c308

  • SHA256

    8b61049658224cee59010937fba47305263528ecdfe16efd7c56f9ee81a997d4

  • SHA512

    1defd13018df142ead4121536f04d0077fff7a64984131a0e45a395fa3e1092bd9896ea6320f96b47b8064ba9be7080b60df2701a1fd4ea43be56d78d0804a1e

  • SSDEEP

    3072:+jMGhTGDsxReK5r5UevAr4xh4DKo6ZMAo6/4cl1B/AGEv+sCHajtjsHybNw3tJUi:UFNRjW4xh/VMSZXB/fEvGTEW

Malware Config

Targets

    • Target

      2024-03-15_5f33b06ad4178ae57a6983f629d5f4a3_virlock

    • Size

      253KB

    • MD5

      5f33b06ad4178ae57a6983f629d5f4a3

    • SHA1

      91a509907e9f1ed27b7152823141dedb42d4c308

    • SHA256

      8b61049658224cee59010937fba47305263528ecdfe16efd7c56f9ee81a997d4

    • SHA512

      1defd13018df142ead4121536f04d0077fff7a64984131a0e45a395fa3e1092bd9896ea6320f96b47b8064ba9be7080b60df2701a1fd4ea43be56d78d0804a1e

    • SSDEEP

      3072:+jMGhTGDsxReK5r5UevAr4xh4DKo6ZMAo6/4cl1B/AGEv+sCHajtjsHybNw3tJUi:UFNRjW4xh/VMSZXB/fEvGTEW

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (76) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks