General

  • Target

    2024-04-21_ce15edd30a47c710c1f0710e4b8b3176_virlock

  • Size

    189KB

  • Sample

    240421-yf6gnsae24

  • MD5

    ce15edd30a47c710c1f0710e4b8b3176

  • SHA1

    adea2542701d780a259dbcf6e14a76f5d75c00ef

  • SHA256

    d22f855cb8bfe7c34ff3bcc354520edd189755fdb47edc4679e4fdc91835ef46

  • SHA512

    91a54c17002dc5b593a1ac539a4638f3f2acaf0d9529533e062a8caecac285709ccf5b4d656a7e09ce55b3291b62ffb318b6f41e51de409e1714eb74137e36b8

  • SSDEEP

    3072:AvrCR1J6YXfUVa3EFPVu0oEGxFmUjUs4+WB+UXBWYB0XDqSO09HY3xD7XOLriMYf:AvGZVf6VujEkvUsjS+UXBWYB0XDqST9K

Malware Config

Targets

    • Target

      2024-04-21_ce15edd30a47c710c1f0710e4b8b3176_virlock

    • Size

      189KB

    • MD5

      ce15edd30a47c710c1f0710e4b8b3176

    • SHA1

      adea2542701d780a259dbcf6e14a76f5d75c00ef

    • SHA256

      d22f855cb8bfe7c34ff3bcc354520edd189755fdb47edc4679e4fdc91835ef46

    • SHA512

      91a54c17002dc5b593a1ac539a4638f3f2acaf0d9529533e062a8caecac285709ccf5b4d656a7e09ce55b3291b62ffb318b6f41e51de409e1714eb74137e36b8

    • SSDEEP

      3072:AvrCR1J6YXfUVa3EFPVu0oEGxFmUjUs4+WB+UXBWYB0XDqSO09HY3xD7XOLriMYf:AvGZVf6VujEkvUsjS+UXBWYB0XDqST9K

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks