General

  • Target

    2024-05-09_8f1753eed0fce6ac063e6c0d07912379_virlock

  • Size

    186KB

  • Sample

    240509-eazx6agg9t

  • MD5

    8f1753eed0fce6ac063e6c0d07912379

  • SHA1

    8056c69c595e35c2b8f6fc1c366820e042f21c7a

  • SHA256

    79ba71c2be9e9ccd31d99d2e9137d71f03974f51eb51d22a37c2fd339981e3f1

  • SHA512

    cc681972e3fcaa217ac5e7f27db1f0ebe65ea5b2f974f65a2ca2684d7245c7ae73fed0e6ece5ecd122d2788ca101294853d9710401948705df2010cec53b67d1

  • SSDEEP

    3072:r0EhCCTYF7NChEh/hmI70GjOuPgQ4QL6K92OBCdtFo:rxNhhIQGjOuP1So

Malware Config

Targets

    • Target

      2024-05-09_8f1753eed0fce6ac063e6c0d07912379_virlock

    • Size

      186KB

    • MD5

      8f1753eed0fce6ac063e6c0d07912379

    • SHA1

      8056c69c595e35c2b8f6fc1c366820e042f21c7a

    • SHA256

      79ba71c2be9e9ccd31d99d2e9137d71f03974f51eb51d22a37c2fd339981e3f1

    • SHA512

      cc681972e3fcaa217ac5e7f27db1f0ebe65ea5b2f974f65a2ca2684d7245c7ae73fed0e6ece5ecd122d2788ca101294853d9710401948705df2010cec53b67d1

    • SSDEEP

      3072:r0EhCCTYF7NChEh/hmI70GjOuPgQ4QL6K92OBCdtFo:rxNhhIQGjOuP1So

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (87) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks