General

  • Target

    2024-03-27_112e7518fc2f62c3ab27ec3bbc207a11_virlock

  • Size

    223KB

  • Sample

    240327-mf9njsdb6y

  • MD5

    112e7518fc2f62c3ab27ec3bbc207a11

  • SHA1

    8453aa5e027dae43943dade1285840761bfc6ff7

  • SHA256

    caa2385b46f32bbac6bd2724a04a68e5e917ca6ace30a537da31168b6caa4dc5

  • SHA512

    12459d548d33ec37029f834196a48f7d4e44928083ef369572e8ad3abe720ce38b2d3726034bf458c5d924a006e3adbfe2e3e3b11af094f23a7476b63c197b15

  • SSDEEP

    3072:OwOcx6gubGZ4I0IKAjAivCqgwGcl/DJFdP+biz7LrEss461SMn+wXT:9O06gxUFi6qgwGhbawsaSk+wX

Malware Config

Targets

    • Target

      2024-03-27_112e7518fc2f62c3ab27ec3bbc207a11_virlock

    • Size

      223KB

    • MD5

      112e7518fc2f62c3ab27ec3bbc207a11

    • SHA1

      8453aa5e027dae43943dade1285840761bfc6ff7

    • SHA256

      caa2385b46f32bbac6bd2724a04a68e5e917ca6ace30a537da31168b6caa4dc5

    • SHA512

      12459d548d33ec37029f834196a48f7d4e44928083ef369572e8ad3abe720ce38b2d3726034bf458c5d924a006e3adbfe2e3e3b11af094f23a7476b63c197b15

    • SSDEEP

      3072:OwOcx6gubGZ4I0IKAjAivCqgwGcl/DJFdP+biz7LrEss461SMn+wXT:9O06gxUFi6qgwGhbawsaSk+wX

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (77) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks