General

  • Target

    2024-04-18_723b155c058297d56cfdb0bda6ae2dda_virlock

  • Size

    569KB

  • Sample

    240418-b1dwtsgf8y

  • MD5

    723b155c058297d56cfdb0bda6ae2dda

  • SHA1

    3c83a5f94dd3862942554208c2c87f3d6a18ec73

  • SHA256

    5169744ebd89656abb1c052a574c99d8f941b19c3a7fffdc34f0344e87d54773

  • SHA512

    b492c612d5570acaf0120cd2bc3feb876610090ad5bdd26b902508ede758f9afecdc30085caeaa41ba06beb498a187c4985686e9758334c768b3d1695ce2b9dc

  • SSDEEP

    12288:A94KP2cVa6opZ80zvwlbnNVs25+84rAZ+5BxW2s1D9+P8Wu5sJ:A6iVqpZhz4lbnE3

Malware Config

Targets

    • Target

      2024-04-18_723b155c058297d56cfdb0bda6ae2dda_virlock

    • Size

      569KB

    • MD5

      723b155c058297d56cfdb0bda6ae2dda

    • SHA1

      3c83a5f94dd3862942554208c2c87f3d6a18ec73

    • SHA256

      5169744ebd89656abb1c052a574c99d8f941b19c3a7fffdc34f0344e87d54773

    • SHA512

      b492c612d5570acaf0120cd2bc3feb876610090ad5bdd26b902508ede758f9afecdc30085caeaa41ba06beb498a187c4985686e9758334c768b3d1695ce2b9dc

    • SSDEEP

      12288:A94KP2cVa6opZ80zvwlbnNVs25+84rAZ+5BxW2s1D9+P8Wu5sJ:A6iVqpZhz4lbnE3

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (77) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks