General
-
Target
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock
-
Size
117KB
-
Sample
240425-mpt98ahh99
-
MD5
7f7f8daffd0393693e67969ab2723f0c
-
SHA1
ca2c0fcc4d37f0eb37179fcb1acb448da024269c
-
SHA256
5a0630b5158d1cf91a46ae0ec99ccb8d1983eb3070b7c422bc31a75be9af3940
-
SHA512
e550dc22ff11820d7a02f8e50cb91afeae3fa0b46669e6a31aa00d3901309faad6d53afad79be9270df50a42e013373d76910d1463b770a09d881bcbb0379dba
-
SSDEEP
1536:cVpMBh63xyp6UE7e/MUVv+stPTfe8XSJbOfef0fbfufZfvfNf3f/EcQz7q9zmo3q:K2hWyp6UMUh+MbfeYv7qJmQwJwMp5Kq
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock
-
Size
117KB
-
MD5
7f7f8daffd0393693e67969ab2723f0c
-
SHA1
ca2c0fcc4d37f0eb37179fcb1acb448da024269c
-
SHA256
5a0630b5158d1cf91a46ae0ec99ccb8d1983eb3070b7c422bc31a75be9af3940
-
SHA512
e550dc22ff11820d7a02f8e50cb91afeae3fa0b46669e6a31aa00d3901309faad6d53afad79be9270df50a42e013373d76910d1463b770a09d881bcbb0379dba
-
SSDEEP
1536:cVpMBh63xyp6UE7e/MUVv+stPTfe8XSJbOfef0fbfufZfvfNf3f/EcQz7q9zmo3q:K2hWyp6UMUh+MbfeYv7qJmQwJwMp5Kq
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1