General

  • Target

    2024-04-26_1eecf061fa788b0dcc66f50b2b720971_virlock

  • Size

    565KB

  • Sample

    240426-r4ns7sef2y

  • MD5

    1eecf061fa788b0dcc66f50b2b720971

  • SHA1

    02f4844c13159ea6dc5cfe1897f33a5f81e48b3f

  • SHA256

    b99b6e2b13fb388fc89fcac71a04f41da1aa2bb5b3d531fd08070dd41dc82e0d

  • SHA512

    620d0e346f96860526cf5975cf9bdcd08d27f86945ffb1a3e06125a6430c82133a9759790e27b075990014e26b6aab71eaf120fc6f996f30a777e7f7b725d867

  • SSDEEP

    12288:lIoDB/N76YhfI+91cRotl0JMO9HfppuKxyfLsLpKhDv:lIol//hfI+0Wl0fHfpp7xyfLs9KhDv

Malware Config

Targets

    • Target

      2024-04-26_1eecf061fa788b0dcc66f50b2b720971_virlock

    • Size

      565KB

    • MD5

      1eecf061fa788b0dcc66f50b2b720971

    • SHA1

      02f4844c13159ea6dc5cfe1897f33a5f81e48b3f

    • SHA256

      b99b6e2b13fb388fc89fcac71a04f41da1aa2bb5b3d531fd08070dd41dc82e0d

    • SHA512

      620d0e346f96860526cf5975cf9bdcd08d27f86945ffb1a3e06125a6430c82133a9759790e27b075990014e26b6aab71eaf120fc6f996f30a777e7f7b725d867

    • SSDEEP

      12288:lIoDB/N76YhfI+91cRotl0JMO9HfppuKxyfLsLpKhDv:lIol//hfI+0Wl0fHfpp7xyfLs9KhDv

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (80) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks