General

  • Target

    2024-04-25_ad798f4e62f30f95e80e556cb3da5632_virlock

  • Size

    254KB

  • Sample

    240425-hcamtsge67

  • MD5

    ad798f4e62f30f95e80e556cb3da5632

  • SHA1

    dae57239065240bf6c5637657b12e6bdf6be12eb

  • SHA256

    cdca525d2438313f4039fe3b102c43b582f45c69e9a280282244d3e5bf4b2aaf

  • SHA512

    ed148d4f92fd4ca19efffc7a50eab8acc4b23ab27572fe17936ffc1db0a195231e5beb79b2bb0f390cc08309e65fe530951c3095c9d6c50fa91a7607cd04d2d1

  • SSDEEP

    3072:KvqRIBUHaSWG97LXXJaulLVIbcf+feA7suXQQ/GhxGkSwkD:cqia6SWezXJauXIbcfj8bQQ/GhjkD

Malware Config

Targets

    • Target

      2024-04-25_ad798f4e62f30f95e80e556cb3da5632_virlock

    • Size

      254KB

    • MD5

      ad798f4e62f30f95e80e556cb3da5632

    • SHA1

      dae57239065240bf6c5637657b12e6bdf6be12eb

    • SHA256

      cdca525d2438313f4039fe3b102c43b582f45c69e9a280282244d3e5bf4b2aaf

    • SHA512

      ed148d4f92fd4ca19efffc7a50eab8acc4b23ab27572fe17936ffc1db0a195231e5beb79b2bb0f390cc08309e65fe530951c3095c9d6c50fa91a7607cd04d2d1

    • SSDEEP

      3072:KvqRIBUHaSWG97LXXJaulLVIbcf+feA7suXQQ/GhxGkSwkD:cqia6SWezXJauXIbcfj8bQQ/GhjkD

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks