General

  • Target

    2024-05-01_8e95604196cdd95c43f585e321e8d299_virlock

  • Size

    198KB

  • Sample

    240501-jqlspaba41

  • MD5

    8e95604196cdd95c43f585e321e8d299

  • SHA1

    0d03a07a37c35d1f84f6dbfc606141af4019aa8f

  • SHA256

    e2bd0c3af059bdc789d352d29666b97ebdf478b37cc3693263c8f4df2cd3fd59

  • SHA512

    7d5d9a6b217cd9e939f5b0d397e76a413c363691a426619bcf62c75668f0a047d7596a6f4a4eb3cce6d7ca953c9331b8eae4e7db511ae0cab876eb7d533b014b

  • SSDEEP

    3072:sEsJyX9Sweg8nZpJJjwmJbDekXsmguX8fDmmDK0u1Tf4Ks4Os/QJ/0oV+bdnZU:FW89SzZrTJbDSYMRhuXB20MsZU

Malware Config

Targets

    • Target

      2024-05-01_8e95604196cdd95c43f585e321e8d299_virlock

    • Size

      198KB

    • MD5

      8e95604196cdd95c43f585e321e8d299

    • SHA1

      0d03a07a37c35d1f84f6dbfc606141af4019aa8f

    • SHA256

      e2bd0c3af059bdc789d352d29666b97ebdf478b37cc3693263c8f4df2cd3fd59

    • SHA512

      7d5d9a6b217cd9e939f5b0d397e76a413c363691a426619bcf62c75668f0a047d7596a6f4a4eb3cce6d7ca953c9331b8eae4e7db511ae0cab876eb7d533b014b

    • SSDEEP

      3072:sEsJyX9Sweg8nZpJJjwmJbDekXsmguX8fDmmDK0u1Tf4Ks4Os/QJ/0oV+bdnZU:FW89SzZrTJbDSYMRhuXB20MsZU

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (63) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks