General

  • Target

    2024-04-29_662c87b150f10bdc1e0c17578a02c039_virlock

  • Size

    563KB

  • Sample

    240429-zkjn5sbh27

  • MD5

    662c87b150f10bdc1e0c17578a02c039

  • SHA1

    30f6047f104ec27fff6900caa79709dd30ced035

  • SHA256

    d991cd81c5fbf86eaf0d165aab269df9c5f35ba138363079be508974834321ef

  • SHA512

    45754e3fae6262e333694c4cce78abb03368e48cbbfcc813f8009e7e2cd2100f5c25aca29f863991e21b07e314b784d0e8ca471d78a23c671b6a6ae7396c5d11

  • SSDEEP

    12288:KGTdewkSUpnrmPnFsCxvdARD4dYtLOw6QHCCVwnM6Ft0MP/CSiJw4zvdpMB:KGTdew7UprmnFsCxzYtLOw6Qlw9Ft0Mx

Malware Config

Targets

    • Target

      2024-04-29_662c87b150f10bdc1e0c17578a02c039_virlock

    • Size

      563KB

    • MD5

      662c87b150f10bdc1e0c17578a02c039

    • SHA1

      30f6047f104ec27fff6900caa79709dd30ced035

    • SHA256

      d991cd81c5fbf86eaf0d165aab269df9c5f35ba138363079be508974834321ef

    • SHA512

      45754e3fae6262e333694c4cce78abb03368e48cbbfcc813f8009e7e2cd2100f5c25aca29f863991e21b07e314b784d0e8ca471d78a23c671b6a6ae7396c5d11

    • SSDEEP

      12288:KGTdewkSUpnrmPnFsCxvdARD4dYtLOw6QHCCVwnM6Ft0MP/CSiJw4zvdpMB:KGTdew7UprmnFsCxzYtLOw6Qlw9Ft0Mx

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (81) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks