General

  • Target

    2024-03-28_442a24cfa94b02b1d6a35fb655c02b2e_virlock

  • Size

    254KB

  • Sample

    240328-kgf2hseb42

  • MD5

    442a24cfa94b02b1d6a35fb655c02b2e

  • SHA1

    6b24cf10169c530f3878d61bbc00e627f3a397c5

  • SHA256

    cb7dd658fdc9974c7912047db4e9e4ea46612e6fd884f2edbd3f2e065b3e3eac

  • SHA512

    1a9b11a078cd1af460c62129f7b63125a0ba200e81f75722b95508833d0bf5edc019aedd693f3d09deb2f4ce189f0317c7f6ea73df4a98b22879e9b7f1fba3f4

  • SSDEEP

    6144:2LWC+zosNCBT48piUxBxhJX33plUUuMrIdo:2yC+z5iT48YUxBxhJX33pyUuMrF

Malware Config

Targets

    • Target

      2024-03-28_442a24cfa94b02b1d6a35fb655c02b2e_virlock

    • Size

      254KB

    • MD5

      442a24cfa94b02b1d6a35fb655c02b2e

    • SHA1

      6b24cf10169c530f3878d61bbc00e627f3a397c5

    • SHA256

      cb7dd658fdc9974c7912047db4e9e4ea46612e6fd884f2edbd3f2e065b3e3eac

    • SHA512

      1a9b11a078cd1af460c62129f7b63125a0ba200e81f75722b95508833d0bf5edc019aedd693f3d09deb2f4ce189f0317c7f6ea73df4a98b22879e9b7f1fba3f4

    • SSDEEP

      6144:2LWC+zosNCBT48piUxBxhJX33plUUuMrIdo:2yC+z5iT48YUxBxhJX33pyUuMrF

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (91) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

4
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks