General

  • Target

    2024-05-14_21d829e7e745d92d4e7eae3f92d9f362_virlock

  • Size

    653KB

  • Sample

    240514-m48fdsch4z

  • MD5

    21d829e7e745d92d4e7eae3f92d9f362

  • SHA1

    bae0ebac5f50803886f40e0bad0dea8dbfabf790

  • SHA256

    459b45ae0f68b627941a9ad85b716e6a182d8598c685ad9ef53aa5ee36e71fd4

  • SHA512

    68ebd6b0d0e4940e5e10837b347db2f87801360231b6ab6e68c7dc77efe041fe1489ef3a1875c7529b2a78a72190d129fa40675313bcfffd911823b9cd855483

  • SSDEEP

    12288:OpiORuIyswSZFYvMupk93X9jjNEiqTt9NuoJ5C:OTRUzW93X9jRJqT/v0

Malware Config

Targets

    • Target

      2024-05-14_21d829e7e745d92d4e7eae3f92d9f362_virlock

    • Size

      653KB

    • MD5

      21d829e7e745d92d4e7eae3f92d9f362

    • SHA1

      bae0ebac5f50803886f40e0bad0dea8dbfabf790

    • SHA256

      459b45ae0f68b627941a9ad85b716e6a182d8598c685ad9ef53aa5ee36e71fd4

    • SHA512

      68ebd6b0d0e4940e5e10837b347db2f87801360231b6ab6e68c7dc77efe041fe1489ef3a1875c7529b2a78a72190d129fa40675313bcfffd911823b9cd855483

    • SSDEEP

      12288:OpiORuIyswSZFYvMupk93X9jjNEiqTt9NuoJ5C:OTRUzW93X9jRJqT/v0

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks