General

  • Target

    2024-04-26_2062fd48ab236b1a76116831761e4892_virlock

  • Size

    565KB

  • Sample

    240426-b34j9sha6w

  • MD5

    2062fd48ab236b1a76116831761e4892

  • SHA1

    120a12bf1897a6e4bfd0e5464f8bf93937359ad5

  • SHA256

    9b1b01bde1bf0b329a56144cccf69dd13f2903f50b422ae9c8ac4f178c73b24c

  • SHA512

    21c1c74e173beea4c1ac825c65cf934fa695906603e179269477bb89d4e67bd823151a5066fb50f345ad48ff49ecedc347ee587dfbe357daef5aeb8f92a1cdf4

  • SSDEEP

    12288:MmMFEc19bMyAHgLdyayR8Ts4OhWA5Kkh5WYFT5iaEJSjXP:0X4HOnY5Xh5WYFT52+XP

Malware Config

Targets

    • Target

      2024-04-26_2062fd48ab236b1a76116831761e4892_virlock

    • Size

      565KB

    • MD5

      2062fd48ab236b1a76116831761e4892

    • SHA1

      120a12bf1897a6e4bfd0e5464f8bf93937359ad5

    • SHA256

      9b1b01bde1bf0b329a56144cccf69dd13f2903f50b422ae9c8ac4f178c73b24c

    • SHA512

      21c1c74e173beea4c1ac825c65cf934fa695906603e179269477bb89d4e67bd823151a5066fb50f345ad48ff49ecedc347ee587dfbe357daef5aeb8f92a1cdf4

    • SSDEEP

      12288:MmMFEc19bMyAHgLdyayR8Ts4OhWA5Kkh5WYFT5iaEJSjXP:0X4HOnY5Xh5WYFT52+XP

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (79) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks