General

  • Target

    2024-03-15_68990b9e6c247de069deca1fbc0a776c_virlock

  • Size

    255KB

  • Sample

    240315-v57t9aed5w

  • MD5

    68990b9e6c247de069deca1fbc0a776c

  • SHA1

    b04f8a4b300debb6700cb2594ce3ad5082edb6e2

  • SHA256

    896c7884f5fac925d235665ad8fa8ffb5deecf3904d396aff3276bac2f7544f5

  • SHA512

    62309af76de67035e5aed49a74908fbe797e9848c45ba6efeb7fef627fb7e99c5c1eda80e086e87ccdf316084c6c7e3e6fb862c7b153940302dbed2b682088b9

  • SSDEEP

    3072:XDwNdFVYnZNrzQF2GWG6n8S7MW8xAuLNamd5j3PNa1NRxlDv7V:qdeZBQgGQn8S7M7b3dVMlR

Malware Config

Targets

    • Target

      2024-03-15_68990b9e6c247de069deca1fbc0a776c_virlock

    • Size

      255KB

    • MD5

      68990b9e6c247de069deca1fbc0a776c

    • SHA1

      b04f8a4b300debb6700cb2594ce3ad5082edb6e2

    • SHA256

      896c7884f5fac925d235665ad8fa8ffb5deecf3904d396aff3276bac2f7544f5

    • SHA512

      62309af76de67035e5aed49a74908fbe797e9848c45ba6efeb7fef627fb7e99c5c1eda80e086e87ccdf316084c6c7e3e6fb862c7b153940302dbed2b682088b9

    • SSDEEP

      3072:XDwNdFVYnZNrzQF2GWG6n8S7MW8xAuLNamd5j3PNa1NRxlDv7V:qdeZBQgGQn8S7M7b3dVMlR

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (80) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks