General

  • Target

    2024-04-28_638ebaf1bea8850ca9ada168c65de1c6_virlock

  • Size

    196KB

  • Sample

    240428-m9afjsec54

  • MD5

    638ebaf1bea8850ca9ada168c65de1c6

  • SHA1

    1bbcefb36ffab914c5606d3c944e1c3a493a1d78

  • SHA256

    b3433542361a92fee7c35339e42ed35682151e1cb7c94116f0259a19954b1f76

  • SHA512

    ca7242c7dbf8d44b0371b5063f65652298d84e00bb684f4416eeef34249075d66a3b1651528c7d1acadbdf7e3e6ae930cab8e86b2e1691335782806c15d9c3dc

  • SSDEEP

    3072:lPfoxhGuluhBNIyOZt6T5e2GsFEjyKItKJximQdHpTEOA3SNP8PA:x2GIy+6T57GsFEv3JAmahUOP8Y

Malware Config

Targets

    • Target

      2024-04-28_638ebaf1bea8850ca9ada168c65de1c6_virlock

    • Size

      196KB

    • MD5

      638ebaf1bea8850ca9ada168c65de1c6

    • SHA1

      1bbcefb36ffab914c5606d3c944e1c3a493a1d78

    • SHA256

      b3433542361a92fee7c35339e42ed35682151e1cb7c94116f0259a19954b1f76

    • SHA512

      ca7242c7dbf8d44b0371b5063f65652298d84e00bb684f4416eeef34249075d66a3b1651528c7d1acadbdf7e3e6ae930cab8e86b2e1691335782806c15d9c3dc

    • SSDEEP

      3072:lPfoxhGuluhBNIyOZt6T5e2GsFEjyKItKJximQdHpTEOA3SNP8PA:x2GIy+6T57GsFEv3JAmahUOP8Y

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (57) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks