General
-
Target
2024-04-29_662c87b150f10bdc1e0c17578a02c039_virlock
-
Size
563KB
-
Sample
240429-zkjn5sbh27
-
MD5
662c87b150f10bdc1e0c17578a02c039
-
SHA1
30f6047f104ec27fff6900caa79709dd30ced035
-
SHA256
d991cd81c5fbf86eaf0d165aab269df9c5f35ba138363079be508974834321ef
-
SHA512
45754e3fae6262e333694c4cce78abb03368e48cbbfcc813f8009e7e2cd2100f5c25aca29f863991e21b07e314b784d0e8ca471d78a23c671b6a6ae7396c5d11
-
SSDEEP
12288:KGTdewkSUpnrmPnFsCxvdARD4dYtLOw6QHCCVwnM6Ft0MP/CSiJw4zvdpMB:KGTdew7UprmnFsCxzYtLOw6Qlw9Ft0Mx
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-29_662c87b150f10bdc1e0c17578a02c039_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-29_662c87b150f10bdc1e0c17578a02c039_virlock.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-29_662c87b150f10bdc1e0c17578a02c039_virlock
-
Size
563KB
-
MD5
662c87b150f10bdc1e0c17578a02c039
-
SHA1
30f6047f104ec27fff6900caa79709dd30ced035
-
SHA256
d991cd81c5fbf86eaf0d165aab269df9c5f35ba138363079be508974834321ef
-
SHA512
45754e3fae6262e333694c4cce78abb03368e48cbbfcc813f8009e7e2cd2100f5c25aca29f863991e21b07e314b784d0e8ca471d78a23c671b6a6ae7396c5d11
-
SSDEEP
12288:KGTdewkSUpnrmPnFsCxvdARD4dYtLOw6QHCCVwnM6Ft0MP/CSiJw4zvdpMB:KGTdew7UprmnFsCxzYtLOw6Qlw9Ft0Mx
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1