General
-
Target
2024-04-26_20e8c7a8efcf680ca10b23ca9f4670b8_virlock
-
Size
465KB
-
Sample
240426-mwn2saeg66
-
MD5
20e8c7a8efcf680ca10b23ca9f4670b8
-
SHA1
0b4c11c76e7d3dee160009906572a5d153c827a9
-
SHA256
b1ce21834d62cd9c60546e2aaeab83c57ced9c34a17e67ff21725dc6bdd31008
-
SHA512
88d18305ee3773a87d42ca3033dee6731fcb6214ffec9e383e1d1a1722d37460ced3b0b1d431cb745184b09d094029fb8b68d877f5e6b5fdbf124fb88edb1277
-
SSDEEP
12288:c+Pp8sfJYqcZVQKq5YiOMd5z3mDo2K5IPU:lxK4YTQxS
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_20e8c7a8efcf680ca10b23ca9f4670b8_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-26_20e8c7a8efcf680ca10b23ca9f4670b8_virlock.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-26_20e8c7a8efcf680ca10b23ca9f4670b8_virlock
-
Size
465KB
-
MD5
20e8c7a8efcf680ca10b23ca9f4670b8
-
SHA1
0b4c11c76e7d3dee160009906572a5d153c827a9
-
SHA256
b1ce21834d62cd9c60546e2aaeab83c57ced9c34a17e67ff21725dc6bdd31008
-
SHA512
88d18305ee3773a87d42ca3033dee6731fcb6214ffec9e383e1d1a1722d37460ced3b0b1d431cb745184b09d094029fb8b68d877f5e6b5fdbf124fb88edb1277
-
SSDEEP
12288:c+Pp8sfJYqcZVQKq5YiOMd5z3mDo2K5IPU:lxK4YTQxS
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (61) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1