General

  • Target

    2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock

  • Size

    117KB

  • Sample

    240425-mpt98ahh99

  • MD5

    7f7f8daffd0393693e67969ab2723f0c

  • SHA1

    ca2c0fcc4d37f0eb37179fcb1acb448da024269c

  • SHA256

    5a0630b5158d1cf91a46ae0ec99ccb8d1983eb3070b7c422bc31a75be9af3940

  • SHA512

    e550dc22ff11820d7a02f8e50cb91afeae3fa0b46669e6a31aa00d3901309faad6d53afad79be9270df50a42e013373d76910d1463b770a09d881bcbb0379dba

  • SSDEEP

    1536:cVpMBh63xyp6UE7e/MUVv+stPTfe8XSJbOfef0fbfufZfvfNf3f/EcQz7q9zmo3q:K2hWyp6UMUh+MbfeYv7qJmQwJwMp5Kq

Malware Config

Targets

    • Target

      2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock

    • Size

      117KB

    • MD5

      7f7f8daffd0393693e67969ab2723f0c

    • SHA1

      ca2c0fcc4d37f0eb37179fcb1acb448da024269c

    • SHA256

      5a0630b5158d1cf91a46ae0ec99ccb8d1983eb3070b7c422bc31a75be9af3940

    • SHA512

      e550dc22ff11820d7a02f8e50cb91afeae3fa0b46669e6a31aa00d3901309faad6d53afad79be9270df50a42e013373d76910d1463b770a09d881bcbb0379dba

    • SSDEEP

      1536:cVpMBh63xyp6UE7e/MUVv+stPTfe8XSJbOfef0fbfufZfvfNf3f/EcQz7q9zmo3q:K2hWyp6UMUh+MbfeYv7qJmQwJwMp5Kq

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (82) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks