General
-
Target
2024-04-24_8fe9697d79c10b6deb1e2faad85b5b6d_virlock
-
Size
346KB
-
Sample
240424-em1p8aeg28
-
MD5
8fe9697d79c10b6deb1e2faad85b5b6d
-
SHA1
dec8228a2325f6a87eeaec111b9467b3b65cca92
-
SHA256
e23055c16b3ad97612c80dac61d2a4fd660e597e81607d41975f5a4072a1bd57
-
SHA512
695b757e4f543fe10c8195f4ea5b1d1dfc5c199412b153765c2914d1423f52243fe874ad4cff522207edbd1d64a09a237dfa3d05bf60f38cfddebdf92732f0f5
-
SSDEEP
6144:8Fwwixdz9F1o+WVAhVZnCKx0V41ahYBMK:81S1o+WEjnCKx0MaG
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-24_8fe9697d79c10b6deb1e2faad85b5b6d_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-24_8fe9697d79c10b6deb1e2faad85b5b6d_virlock.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-24_8fe9697d79c10b6deb1e2faad85b5b6d_virlock
-
Size
346KB
-
MD5
8fe9697d79c10b6deb1e2faad85b5b6d
-
SHA1
dec8228a2325f6a87eeaec111b9467b3b65cca92
-
SHA256
e23055c16b3ad97612c80dac61d2a4fd660e597e81607d41975f5a4072a1bd57
-
SHA512
695b757e4f543fe10c8195f4ea5b1d1dfc5c199412b153765c2914d1423f52243fe874ad4cff522207edbd1d64a09a237dfa3d05bf60f38cfddebdf92732f0f5
-
SSDEEP
6144:8Fwwixdz9F1o+WVAhVZnCKx0V41ahYBMK:81S1o+WEjnCKx0MaG
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1