General

  • Target

    2024-04-11_9c61303a03cfe31c6807bd3bf233d7de_virlock

  • Size

    826KB

  • Sample

    240411-s3jzashg5s

  • MD5

    9c61303a03cfe31c6807bd3bf233d7de

  • SHA1

    cad56f084025ea4922c123ce901e3750c5dddf58

  • SHA256

    6ec06b9e1f1d773b9632268ce49a30d6ee8dfd788805a372d9c8d3ecb2a818ab

  • SHA512

    f10be279029c71e642898acf1e4de4b46d89bb13b9051fd1eba27e626ca98544b3453a61787ae581abccaf9d74ff50365470456833472cc4bc17a36902d663ae

  • SSDEEP

    24576:GUElK2BiKZ22Vj4orWMAtv5wdV9fN4em8K3kvLbQe8:FkK2BJw21ZahwF4em8KUF

Malware Config

Targets

    • Target

      2024-04-11_9c61303a03cfe31c6807bd3bf233d7de_virlock

    • Size

      826KB

    • MD5

      9c61303a03cfe31c6807bd3bf233d7de

    • SHA1

      cad56f084025ea4922c123ce901e3750c5dddf58

    • SHA256

      6ec06b9e1f1d773b9632268ce49a30d6ee8dfd788805a372d9c8d3ecb2a818ab

    • SHA512

      f10be279029c71e642898acf1e4de4b46d89bb13b9051fd1eba27e626ca98544b3453a61787ae581abccaf9d74ff50365470456833472cc4bc17a36902d663ae

    • SSDEEP

      24576:GUElK2BiKZ22Vj4orWMAtv5wdV9fN4em8K3kvLbQe8:FkK2BJw21ZahwF4em8KUF

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (81) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks