General
-
Target
2024-04-28_38e74eec51a199732f6c945675934e66_virlock
-
Size
196KB
-
Sample
240428-pph83afg73
-
MD5
38e74eec51a199732f6c945675934e66
-
SHA1
c3909e82c3af1d14d479e51c53d01ce813019169
-
SHA256
54b9a1eb70ff5cbe24232176571fc0f76b58091a6a11efc161a1705b298a4f36
-
SHA512
9f94bd8361632dbf915fc375b46c7f82a2bf30affed27af8091ff290b79bc07e14694b4b6f6f7221b87689df0822aac334b66bf7d720f57c0364d7ea799bd81a
-
SSDEEP
3072:TrfEcLvtDS4zMQTOeDmowHDU7nJgG3lZV9bxsesHUMQZAf6w:3fEcTGQi6m5jU7nxj9bxZjZZw
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-04-28_38e74eec51a199732f6c945675934e66_virlock
-
Size
196KB
-
MD5
38e74eec51a199732f6c945675934e66
-
SHA1
c3909e82c3af1d14d479e51c53d01ce813019169
-
SHA256
54b9a1eb70ff5cbe24232176571fc0f76b58091a6a11efc161a1705b298a4f36
-
SHA512
9f94bd8361632dbf915fc375b46c7f82a2bf30affed27af8091ff290b79bc07e14694b4b6f6f7221b87689df0822aac334b66bf7d720f57c0364d7ea799bd81a
-
SSDEEP
3072:TrfEcLvtDS4zMQTOeDmowHDU7nJgG3lZV9bxsesHUMQZAf6w:3fEcTGQi6m5jU7nxj9bxZjZZw
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1