General
-
Target
2024-03-28_22d16bf44f4e3b4b6d08c7e4bf47fb1f_virlock
-
Size
225KB
-
Sample
240328-czay8aah49
-
MD5
22d16bf44f4e3b4b6d08c7e4bf47fb1f
-
SHA1
aa687c756bed231814fa2864b28fe22f2e2fa917
-
SHA256
432735a2d021e4fb5cf9dc627c1e109a0b54ded2e836e4bd74a472388431e31c
-
SHA512
419870ad988396ea2299591a952d1fb2f75f1473e2e616c033d3e3c791e9174701f6279a0b6e3520b19e665005d3f866681119103abe972bae3c412e1d5b5560
-
SSDEEP
6144:N3mdlWax3u6WnymZkYQklDxCLTB8gTuQIfOR:NWdZRWNZkYvOBvTVR
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_22d16bf44f4e3b4b6d08c7e4bf47fb1f_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_22d16bf44f4e3b4b6d08c7e4bf47fb1f_virlock.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-28_22d16bf44f4e3b4b6d08c7e4bf47fb1f_virlock
-
Size
225KB
-
MD5
22d16bf44f4e3b4b6d08c7e4bf47fb1f
-
SHA1
aa687c756bed231814fa2864b28fe22f2e2fa917
-
SHA256
432735a2d021e4fb5cf9dc627c1e109a0b54ded2e836e4bd74a472388431e31c
-
SHA512
419870ad988396ea2299591a952d1fb2f75f1473e2e616c033d3e3c791e9174701f6279a0b6e3520b19e665005d3f866681119103abe972bae3c412e1d5b5560
-
SSDEEP
6144:N3mdlWax3u6WnymZkYQklDxCLTB8gTuQIfOR:NWdZRWNZkYvOBvTVR
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1