General

  • Target

    2024-04-17_626c110b33f0c0e9c035c63070132ce5_virlock

  • Size

    564KB

  • Sample

    240417-vbhy2afg74

  • MD5

    626c110b33f0c0e9c035c63070132ce5

  • SHA1

    6a6e2ad48a15337a57209dae94d3075be43c11da

  • SHA256

    cbe2d24a2ce60eee4a461f068e033a081f57b10cc68a29d8e5af6f0ac0cd6179

  • SHA512

    ac24278685f6b34c1e80299e23051688f8ca70f2c863d45d82225aed6a1cacbd917ac8e029b856566dac34d70630c63acc4455a01e038022470c0f32ae6efa1b

  • SSDEEP

    12288:qbhjNB4FMrjJ/MBNzxjCFY2xtd2o1DdD1AA00f:6YkJwl1Sd2od

Malware Config

Targets

    • Target

      2024-04-17_626c110b33f0c0e9c035c63070132ce5_virlock

    • Size

      564KB

    • MD5

      626c110b33f0c0e9c035c63070132ce5

    • SHA1

      6a6e2ad48a15337a57209dae94d3075be43c11da

    • SHA256

      cbe2d24a2ce60eee4a461f068e033a081f57b10cc68a29d8e5af6f0ac0cd6179

    • SHA512

      ac24278685f6b34c1e80299e23051688f8ca70f2c863d45d82225aed6a1cacbd917ac8e029b856566dac34d70630c63acc4455a01e038022470c0f32ae6efa1b

    • SSDEEP

      12288:qbhjNB4FMrjJ/MBNzxjCFY2xtd2o1DdD1AA00f:6YkJwl1Sd2od

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (89) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks