General

  • Target

    2024-04-26_2ac0a55b85e8612b558ed2d52457bc22_virlock

  • Size

    212KB

  • Sample

    240426-mwyafseg75

  • MD5

    2ac0a55b85e8612b558ed2d52457bc22

  • SHA1

    18c4ecccad32e55565197746b0fe87b0fd001391

  • SHA256

    509b0e73fbbe5b65f9a1f2168261c59305f99f14aac487db7e4294243c4f28cd

  • SHA512

    685bfaf1ead4d585c76654fd8228b1c46b1e7adfc291afc65934cbc59f1ad7b27152d6f6627883986bbc8ef3e3dd7427968ec34c4160e4309d3e34f2763fc274

  • SSDEEP

    6144:j84Hvu791wKrsNjdzAjDy+u89hU2xWn7:j8wv21H0jdzAjDy+u8E2xWn7

Malware Config

Targets

    • Target

      2024-04-26_2ac0a55b85e8612b558ed2d52457bc22_virlock

    • Size

      212KB

    • MD5

      2ac0a55b85e8612b558ed2d52457bc22

    • SHA1

      18c4ecccad32e55565197746b0fe87b0fd001391

    • SHA256

      509b0e73fbbe5b65f9a1f2168261c59305f99f14aac487db7e4294243c4f28cd

    • SHA512

      685bfaf1ead4d585c76654fd8228b1c46b1e7adfc291afc65934cbc59f1ad7b27152d6f6627883986bbc8ef3e3dd7427968ec34c4160e4309d3e34f2763fc274

    • SSDEEP

      6144:j84Hvu791wKrsNjdzAjDy+u89hU2xWn7:j8wv21H0jdzAjDy+u8E2xWn7

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (81) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks