General
-
Target
2024-03-28_504af718858a2c430d2bfd4c2951f19d_virlock
-
Size
111KB
-
Sample
240328-svn82sae56
-
MD5
504af718858a2c430d2bfd4c2951f19d
-
SHA1
226e8ecd16f59c19b7748508f14191700d6d2ce4
-
SHA256
6e987d3a0c2243ab7ed4809763bed0429560698d416975416fa73c2ebe3a7620
-
SHA512
4a3e49fb6f5c6e63e9fd24e3158ba0c45ea8cbbde3e6249c73d4a5ece990346517951263617ba87ec33125cc84e0f7c6770fc4fd884accec2fcf30798959f40d
-
SSDEEP
3072:uMam5eOBP3lbL83kiPk1R1Fq8TxtkZ6hG2sG039Ar4aEpAxz0u57aoa+Ng3ACSav:uMaWPRiFCtkZ6hG2f039Ar4aEpAxz0u2
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_504af718858a2c430d2bfd4c2951f19d_virlock.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-03-28_504af718858a2c430d2bfd4c2951f19d_virlock.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-28_504af718858a2c430d2bfd4c2951f19d_virlock
-
Size
111KB
-
MD5
504af718858a2c430d2bfd4c2951f19d
-
SHA1
226e8ecd16f59c19b7748508f14191700d6d2ce4
-
SHA256
6e987d3a0c2243ab7ed4809763bed0429560698d416975416fa73c2ebe3a7620
-
SHA512
4a3e49fb6f5c6e63e9fd24e3158ba0c45ea8cbbde3e6249c73d4a5ece990346517951263617ba87ec33125cc84e0f7c6770fc4fd884accec2fcf30798959f40d
-
SSDEEP
3072:uMam5eOBP3lbL83kiPk1R1Fq8TxtkZ6hG2sG039Ar4aEpAxz0u57aoa+Ng3ACSav:uMaWPRiFCtkZ6hG2f039Ar4aEpAxz0u2
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1