General

  • Target

    2024-04-25_3d1895c54028975d66fac0834e33b233_virlock

  • Size

    117KB

  • Sample

    240425-zn76xaef3t

  • MD5

    3d1895c54028975d66fac0834e33b233

  • SHA1

    3762d7fb190df0455026adacbaa9e85603b35c73

  • SHA256

    fdfc2eab12b84cf52ff21a980a1dbfedb23b30f3fd9e209e6550c3e445b9c7d7

  • SHA512

    b8c398828ccaf1e0f3791df9230c3c5463c3127b3458f903bd13281ba1005350e046ad3583e1d397979460bd100f6964ca7d4f6c698c7d3c6b74ec16bd7b8abb

  • SSDEEP

    3072:mWKVCkX3qprUD3uzsEkQn4sedH0selFCQCtk5cRdw:ngCu30ru3uRkQn43felFCQxaR

Malware Config

Targets

    • Target

      2024-04-25_3d1895c54028975d66fac0834e33b233_virlock

    • Size

      117KB

    • MD5

      3d1895c54028975d66fac0834e33b233

    • SHA1

      3762d7fb190df0455026adacbaa9e85603b35c73

    • SHA256

      fdfc2eab12b84cf52ff21a980a1dbfedb23b30f3fd9e209e6550c3e445b9c7d7

    • SHA512

      b8c398828ccaf1e0f3791df9230c3c5463c3127b3458f903bd13281ba1005350e046ad3583e1d397979460bd100f6964ca7d4f6c698c7d3c6b74ec16bd7b8abb

    • SSDEEP

      3072:mWKVCkX3qprUD3uzsEkQn4sedH0selFCQCtk5cRdw:ngCu30ru3uRkQn43felFCQxaR

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks