General

  • Target

    2024-04-09_768cc869429053de7f49ba2930373aad_virlock

  • Size

    139KB

  • Sample

    240409-c6ewraff4w

  • MD5

    768cc869429053de7f49ba2930373aad

  • SHA1

    73fee378916e36ef3d0b0be547e354b8231dd8bf

  • SHA256

    2f841ac1775f20571c96f25443050bb5e7d3959a5268a553a36e340f74e1f3fc

  • SHA512

    abc38d9faaa6fbc1222f2d81783cba615742e18d38cfd7d98c61c2e16453dfe0cf5d297d7bb450bc48e8dcb9dcc6e7348fd3354ec3dd02e6e751e243f9fa9c82

  • SSDEEP

    3072:p3jO3d7jkB4bMzt/CVbKSh07ag2WyJZEnATG9rQNX:pzO3NjfMINh4adl/RG9rE

Malware Config

Targets

    • Target

      2024-04-09_768cc869429053de7f49ba2930373aad_virlock

    • Size

      139KB

    • MD5

      768cc869429053de7f49ba2930373aad

    • SHA1

      73fee378916e36ef3d0b0be547e354b8231dd8bf

    • SHA256

      2f841ac1775f20571c96f25443050bb5e7d3959a5268a553a36e340f74e1f3fc

    • SHA512

      abc38d9faaa6fbc1222f2d81783cba615742e18d38cfd7d98c61c2e16453dfe0cf5d297d7bb450bc48e8dcb9dcc6e7348fd3354ec3dd02e6e751e243f9fa9c82

    • SSDEEP

      3072:p3jO3d7jkB4bMzt/CVbKSh07ag2WyJZEnATG9rQNX:pzO3NjfMINh4adl/RG9rE

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks