General

  • Target

    2024-04-15_8f34460bb8cbb043a2a031a3473c254d_virlock

  • Size

    158KB

  • Sample

    240415-p4w4gahb3s

  • MD5

    8f34460bb8cbb043a2a031a3473c254d

  • SHA1

    ff6c4a24f335def027f7cbe4e46bd837ce5ce406

  • SHA256

    a5bed0bb528139b5ce32df9ba68352b638d1e4a28450a01370c5618ed7802557

  • SHA512

    1f564ba616f07a5144ecb2a3eae0d8a0655e3d03ef1cedc345d6ecdb90811b335bdbccd6a6daebebb7bf5c826ed992d32d473081b28541c833e68f00bf0d87a3

  • SSDEEP

    3072:9DnQrKFAHTkaKvJoUP/NTsYb+uWkbVm53gyq7etH2oV1VYjPouqfmMpF:9bQrKFe6/53bkqKtJjVEPpqeMp

Malware Config

Targets

    • Target

      2024-04-15_8f34460bb8cbb043a2a031a3473c254d_virlock

    • Size

      158KB

    • MD5

      8f34460bb8cbb043a2a031a3473c254d

    • SHA1

      ff6c4a24f335def027f7cbe4e46bd837ce5ce406

    • SHA256

      a5bed0bb528139b5ce32df9ba68352b638d1e4a28450a01370c5618ed7802557

    • SHA512

      1f564ba616f07a5144ecb2a3eae0d8a0655e3d03ef1cedc345d6ecdb90811b335bdbccd6a6daebebb7bf5c826ed992d32d473081b28541c833e68f00bf0d87a3

    • SSDEEP

      3072:9DnQrKFAHTkaKvJoUP/NTsYb+uWkbVm53gyq7etH2oV1VYjPouqfmMpF:9bQrKFe6/53bkqKtJjVEPpqeMp

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks