General

  • Target

    2024-03-19_e9d4796319f758c383ec212ba8dac130_virlock

  • Size

    117KB

  • Sample

    240319-fpkx8aac67

  • MD5

    e9d4796319f758c383ec212ba8dac130

  • SHA1

    085a2681e9ab5a1b4db78b8987de0d3326a54f08

  • SHA256

    c15f130a35c8d363abc25427cf994c4eda8b3a171e528cddb7b5046b29aaeef1

  • SHA512

    6a6c880b330b370bbe2eac482c8474c169b125c8686ce480565e95dd08fb87a20932aa2d03f256439460aa2a10904709a4c44d05eb1a5cb438193c7d5ef60207

  • SSDEEP

    3072:a9UuK+WQq3bxHGJEePFkBxWbpZAdIpDNr5Xi/eRZ34t3Y:a9mNZWP4mr82RZItI

Malware Config

Targets

    • Target

      2024-03-19_e9d4796319f758c383ec212ba8dac130_virlock

    • Size

      117KB

    • MD5

      e9d4796319f758c383ec212ba8dac130

    • SHA1

      085a2681e9ab5a1b4db78b8987de0d3326a54f08

    • SHA256

      c15f130a35c8d363abc25427cf994c4eda8b3a171e528cddb7b5046b29aaeef1

    • SHA512

      6a6c880b330b370bbe2eac482c8474c169b125c8686ce480565e95dd08fb87a20932aa2d03f256439460aa2a10904709a4c44d05eb1a5cb438193c7d5ef60207

    • SSDEEP

      3072:a9UuK+WQq3bxHGJEePFkBxWbpZAdIpDNr5Xi/eRZ34t3Y:a9mNZWP4mr82RZItI

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (80) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks