General

  • Target

    2024-04-26_b05b58fdceb6cfbc37df15c81fe6f427_virlock

  • Size

    179KB

  • Sample

    240426-nqj2baff39

  • MD5

    b05b58fdceb6cfbc37df15c81fe6f427

  • SHA1

    7de0ad14fe631aacb991452cfef7b7e9e764d5e0

  • SHA256

    d0687567b68e5a01db10f95997842fd414160fbd166f1d7ef2559129b0e52a75

  • SHA512

    a54f33d78ca9085e0864f2eec8f64f8bf2569da1fe057959f4ab5c96a76df8facc7de2b1ede48c81e844fb5a41aef7100f6e6c27668e9ab4ff7af565011672a6

  • SSDEEP

    3072:SiPqE0wpWj01H0mm7BvV6gMqmdE5sQQ1R4jBRdQoOvi82TySKqmnYAPJH:PPqE0IWjE0mm79VjMqtqPOxQ0NbKqgT

Malware Config

Targets

    • Target

      2024-04-26_b05b58fdceb6cfbc37df15c81fe6f427_virlock

    • Size

      179KB

    • MD5

      b05b58fdceb6cfbc37df15c81fe6f427

    • SHA1

      7de0ad14fe631aacb991452cfef7b7e9e764d5e0

    • SHA256

      d0687567b68e5a01db10f95997842fd414160fbd166f1d7ef2559129b0e52a75

    • SHA512

      a54f33d78ca9085e0864f2eec8f64f8bf2569da1fe057959f4ab5c96a76df8facc7de2b1ede48c81e844fb5a41aef7100f6e6c27668e9ab4ff7af565011672a6

    • SSDEEP

      3072:SiPqE0wpWj01H0mm7BvV6gMqmdE5sQQ1R4jBRdQoOvi82TySKqmnYAPJH:PPqE0IWjE0mm79VjMqtqPOxQ0NbKqgT

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (85) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks