General

  • Target

    2024-04-26_573d480c59ae0e590231042be5af3475_virlock

  • Size

    226KB

  • Sample

    240426-1lb65acg59

  • MD5

    573d480c59ae0e590231042be5af3475

  • SHA1

    367e0c3e5de5e2f5f6b53424992e2544a3f62ee0

  • SHA256

    f1660bb48c020c36a87730037ec9c16330d4f61ed7091c14893bb57fab3a5a6e

  • SHA512

    4dc8e4e28583f7b01a9db7b6f93e9ed57aba2480b97580ee35d870b4ea825d39f2af5fe424cafab4d14c43de1f1f47e30c3c984be9f88dd9f027a959c864cc12

  • SSDEEP

    6144:OaJubZQ8vP4TA8Z+a8tlmqWLuwM8x6NlJnpe5pXSf+Q:vuZQMoA8Z+a2MewMo6PJnkLXSf+

Malware Config

Targets

    • Target

      2024-04-26_573d480c59ae0e590231042be5af3475_virlock

    • Size

      226KB

    • MD5

      573d480c59ae0e590231042be5af3475

    • SHA1

      367e0c3e5de5e2f5f6b53424992e2544a3f62ee0

    • SHA256

      f1660bb48c020c36a87730037ec9c16330d4f61ed7091c14893bb57fab3a5a6e

    • SHA512

      4dc8e4e28583f7b01a9db7b6f93e9ed57aba2480b97580ee35d870b4ea825d39f2af5fe424cafab4d14c43de1f1f47e30c3c984be9f88dd9f027a959c864cc12

    • SSDEEP

      6144:OaJubZQ8vP4TA8Z+a8tlmqWLuwM8x6NlJnpe5pXSf+Q:vuZQMoA8Z+a2MewMo6PJnkLXSf+

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (86) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks