General

  • Target

    2024-04-23_9c8fd050226e812f6f7ed525dcf7601c_virlock

  • Size

    162KB

  • Sample

    240423-ffnbzsdc54

  • MD5

    9c8fd050226e812f6f7ed525dcf7601c

  • SHA1

    5392c6efdd896d08bbc7e203529bce1a4a4419ed

  • SHA256

    dc5590ba1c9df67e5adf6cce15567d1968fd98c98b171647dc28596ae393a7d8

  • SHA512

    50b851eb6f72607e1966cec6a8e924110f7e4c23d69e6c77e244a4997a0f2e26e6fc00e4387622061cef55077ff0047db9b07026781a551a8e01ac2403159694

  • SSDEEP

    3072:jo3OByBAdx2n/sf4dG6UVzHMZ2CIO+BIGCx0+ZLsa+y:jo3LCdx2/rzUGZxF4IGW0+ZLsa+y

Malware Config

Targets

    • Target

      2024-04-23_9c8fd050226e812f6f7ed525dcf7601c_virlock

    • Size

      162KB

    • MD5

      9c8fd050226e812f6f7ed525dcf7601c

    • SHA1

      5392c6efdd896d08bbc7e203529bce1a4a4419ed

    • SHA256

      dc5590ba1c9df67e5adf6cce15567d1968fd98c98b171647dc28596ae393a7d8

    • SHA512

      50b851eb6f72607e1966cec6a8e924110f7e4c23d69e6c77e244a4997a0f2e26e6fc00e4387622061cef55077ff0047db9b07026781a551a8e01ac2403159694

    • SSDEEP

      3072:jo3OByBAdx2n/sf4dG6UVzHMZ2CIO+BIGCx0+ZLsa+y:jo3LCdx2/rzUGZxF4IGW0+ZLsa+y

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (87) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks