General

  • Target

    2024-04-26_23d2995b93b3be3cf48c15fb089274f8_virlock

  • Size

    254KB

  • Sample

    240426-1kz7kacg53

  • MD5

    23d2995b93b3be3cf48c15fb089274f8

  • SHA1

    982c89da3a998c89e7a11780200197f85539c485

  • SHA256

    1e86f30e08aa5f5e9b9a9e7cfdf1ac967e0b7ce7419e6ff5728e929df4b3a2c1

  • SHA512

    5598054be0b750beb33ee69e1866d778d0522932ed9f28fc0d504464ba66924ab5d69a6b7fb23c9ddfea50f4c963d498ab92da73aefc784cc05d22313e33602f

  • SSDEEP

    3072:QkgSyhdY4mINmliH9ZH3lyD+bLR+nYIz6c3HobAQ+ax2OFjWoSc6M/lPjyoZcdvp:DgSy3pmO5dzIz6UWzx7diuPjyoZcdvp

Malware Config

Targets

    • Target

      2024-04-26_23d2995b93b3be3cf48c15fb089274f8_virlock

    • Size

      254KB

    • MD5

      23d2995b93b3be3cf48c15fb089274f8

    • SHA1

      982c89da3a998c89e7a11780200197f85539c485

    • SHA256

      1e86f30e08aa5f5e9b9a9e7cfdf1ac967e0b7ce7419e6ff5728e929df4b3a2c1

    • SHA512

      5598054be0b750beb33ee69e1866d778d0522932ed9f28fc0d504464ba66924ab5d69a6b7fb23c9ddfea50f4c963d498ab92da73aefc784cc05d22313e33602f

    • SSDEEP

      3072:QkgSyhdY4mINmliH9ZH3lyD+bLR+nYIz6c3HobAQ+ax2OFjWoSc6M/lPjyoZcdvp:DgSy3pmO5dzIz6UWzx7diuPjyoZcdvp

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks