General

  • Target

    2024-04-28_ddd05bdf9ffa16b54a20ca73d202cde0_virlock

  • Size

    294KB

  • Sample

    240428-njt8psef25

  • MD5

    ddd05bdf9ffa16b54a20ca73d202cde0

  • SHA1

    27645a656a8fcd689aeceb8006588406bad8c2b1

  • SHA256

    5da26a001d2f70f77ddb7e9740a9bcc988cec81b0f70376580db1f4f57df6ad4

  • SHA512

    66f2f36ea8374074c60a13a9ad74f5a6b4d7b70ce0be7dc35b2734d6de309241854b76c4f615d4b3ac101770dfb773111177d5e15648497d54ffee7bb1a2902b

  • SSDEEP

    6144:qNCvh5xHLxLuLZtBNXTmLkw9Rm4y1/2fLELF7Tfwyz4gUrBBg6VI1:SsrHLxLuLZtBNXTmLkaRmCQxfwc4g6Be

Malware Config

Targets

    • Target

      2024-04-28_ddd05bdf9ffa16b54a20ca73d202cde0_virlock

    • Size

      294KB

    • MD5

      ddd05bdf9ffa16b54a20ca73d202cde0

    • SHA1

      27645a656a8fcd689aeceb8006588406bad8c2b1

    • SHA256

      5da26a001d2f70f77ddb7e9740a9bcc988cec81b0f70376580db1f4f57df6ad4

    • SHA512

      66f2f36ea8374074c60a13a9ad74f5a6b4d7b70ce0be7dc35b2734d6de309241854b76c4f615d4b3ac101770dfb773111177d5e15648497d54ffee7bb1a2902b

    • SSDEEP

      6144:qNCvh5xHLxLuLZtBNXTmLkw9Rm4y1/2fLELF7Tfwyz4gUrBBg6VI1:SsrHLxLuLZtBNXTmLkaRmCQxfwc4g6Be

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (53) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks