General

  • Target

    2024-05-07_976fa0e179cdeb0d19b34225e1dbed77_virlock

  • Size

    312KB

  • Sample

    240507-nbbrdsdd4s

  • MD5

    976fa0e179cdeb0d19b34225e1dbed77

  • SHA1

    5f2686eb4fb7628fd130e4c7605a551d1a6bb71d

  • SHA256

    d86c5cb32c4fa4f463515d322a5ab3953a1967b918d264c42db1155d18b4ae19

  • SHA512

    5087cbc4ba46124fe6b69bcd9a69bb2c49eb2a5293ce47a773d75cc7d29946f135d8cc707f79e406bdfe02e9f71a250f7d17cde0be4c317da01dbedc0e1eb6c3

  • SSDEEP

    6144:Gpjwubn0SPawnBD0NIVvtfaoC1bwOPVYj5xpbnlZumEBgEcfFgZhnwd:G30Sr0NevtyD10KVMZuRZUqhwd

Malware Config

Targets

    • Target

      2024-05-07_976fa0e179cdeb0d19b34225e1dbed77_virlock

    • Size

      312KB

    • MD5

      976fa0e179cdeb0d19b34225e1dbed77

    • SHA1

      5f2686eb4fb7628fd130e4c7605a551d1a6bb71d

    • SHA256

      d86c5cb32c4fa4f463515d322a5ab3953a1967b918d264c42db1155d18b4ae19

    • SHA512

      5087cbc4ba46124fe6b69bcd9a69bb2c49eb2a5293ce47a773d75cc7d29946f135d8cc707f79e406bdfe02e9f71a250f7d17cde0be4c317da01dbedc0e1eb6c3

    • SSDEEP

      6144:Gpjwubn0SPawnBD0NIVvtfaoC1bwOPVYj5xpbnlZumEBgEcfFgZhnwd:G30Sr0NevtyD10KVMZuRZUqhwd

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (52) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks