General

  • Target

    2024-04-26_16ace8b905aa8d65af5d87c64d6c29f2_virlock

  • Size

    254KB

  • Sample

    240426-pkvrascc6t

  • MD5

    16ace8b905aa8d65af5d87c64d6c29f2

  • SHA1

    d73a87781871b26f8eec45da8b4d65bb2586fd1d

  • SHA256

    6d2d24d3d88e67bd127fc933b6994462d6d89da458bad22fd22adfb5bbe56d2b

  • SHA512

    4d13a0f0e32151f2e4105ce347d292fdaa6bb96c7b605ce3ea24d17b452076d239bb08f70d1bd1a986981e388a3fbfa7f9d3da16301e4fc94aa587dbba3636a2

  • SSDEEP

    6144:gkFkMBmFJ/1f56EWf9ECYiEFDcp/zDC69dJ8:DFkMkz1BIKCYXFYPr9M

Malware Config

Targets

    • Target

      2024-04-26_16ace8b905aa8d65af5d87c64d6c29f2_virlock

    • Size

      254KB

    • MD5

      16ace8b905aa8d65af5d87c64d6c29f2

    • SHA1

      d73a87781871b26f8eec45da8b4d65bb2586fd1d

    • SHA256

      6d2d24d3d88e67bd127fc933b6994462d6d89da458bad22fd22adfb5bbe56d2b

    • SHA512

      4d13a0f0e32151f2e4105ce347d292fdaa6bb96c7b605ce3ea24d17b452076d239bb08f70d1bd1a986981e388a3fbfa7f9d3da16301e4fc94aa587dbba3636a2

    • SSDEEP

      6144:gkFkMBmFJ/1f56EWf9ECYiEFDcp/zDC69dJ8:DFkMkz1BIKCYXFYPr9M

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks