General

  • Target

    2024-04-17_7caf5b17746f3d8e9c87639debaae6fa_virlock

  • Size

    138KB

  • Sample

    240417-vch1eshc7z

  • MD5

    7caf5b17746f3d8e9c87639debaae6fa

  • SHA1

    710ad647ecb1d5259f1ac8bfc554a7a8b116e612

  • SHA256

    2b9e32155f4961542e57fd352e30bbed4eba44c4e9f6b5830f3114cbdb8c53c1

  • SHA512

    df4f17c7df1fc42e1c35a3acd2627378054ed73dac741582eeeab19e50604162d9ba65d6d7f2bd8657257d4a8c8443fc2f09e6643c74ad974cd9e66b191d0e8f

  • SSDEEP

    3072:r7BHjqvmURSHHdeBehA+ZFxeubNleICEh8uC8lEWZRv:ljJqeHd2+ZFxPNiE7lEWP

Malware Config

Targets

    • Target

      2024-04-17_7caf5b17746f3d8e9c87639debaae6fa_virlock

    • Size

      138KB

    • MD5

      7caf5b17746f3d8e9c87639debaae6fa

    • SHA1

      710ad647ecb1d5259f1ac8bfc554a7a8b116e612

    • SHA256

      2b9e32155f4961542e57fd352e30bbed4eba44c4e9f6b5830f3114cbdb8c53c1

    • SHA512

      df4f17c7df1fc42e1c35a3acd2627378054ed73dac741582eeeab19e50604162d9ba65d6d7f2bd8657257d4a8c8443fc2f09e6643c74ad974cd9e66b191d0e8f

    • SSDEEP

      3072:r7BHjqvmURSHHdeBehA+ZFxeubNleICEh8uC8lEWZRv:ljJqeHd2+ZFxPNiE7lEWP

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (80) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks