General

  • Target

    2024-04-24_8fe9697d79c10b6deb1e2faad85b5b6d_virlock

  • Size

    346KB

  • Sample

    240424-em1p8aeg28

  • MD5

    8fe9697d79c10b6deb1e2faad85b5b6d

  • SHA1

    dec8228a2325f6a87eeaec111b9467b3b65cca92

  • SHA256

    e23055c16b3ad97612c80dac61d2a4fd660e597e81607d41975f5a4072a1bd57

  • SHA512

    695b757e4f543fe10c8195f4ea5b1d1dfc5c199412b153765c2914d1423f52243fe874ad4cff522207edbd1d64a09a237dfa3d05bf60f38cfddebdf92732f0f5

  • SSDEEP

    6144:8Fwwixdz9F1o+WVAhVZnCKx0V41ahYBMK:81S1o+WEjnCKx0MaG

Malware Config

Targets

    • Target

      2024-04-24_8fe9697d79c10b6deb1e2faad85b5b6d_virlock

    • Size

      346KB

    • MD5

      8fe9697d79c10b6deb1e2faad85b5b6d

    • SHA1

      dec8228a2325f6a87eeaec111b9467b3b65cca92

    • SHA256

      e23055c16b3ad97612c80dac61d2a4fd660e597e81607d41975f5a4072a1bd57

    • SHA512

      695b757e4f543fe10c8195f4ea5b1d1dfc5c199412b153765c2914d1423f52243fe874ad4cff522207edbd1d64a09a237dfa3d05bf60f38cfddebdf92732f0f5

    • SSDEEP

      6144:8Fwwixdz9F1o+WVAhVZnCKx0V41ahYBMK:81S1o+WEjnCKx0MaG

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks