General

  • Target

    2024-05-20_7a9fdb75863106b0285e3d51ba1f3d33_virlock

  • Size

    269KB

  • Sample

    240520-1dj7rsgf54

  • MD5

    7a9fdb75863106b0285e3d51ba1f3d33

  • SHA1

    c82d334ce57a704fdcb55516d9b889ae124452cd

  • SHA256

    e4313b20e9ea532734d763b5681326c40d5548e7879c6522c88dcf06bc8f6f9a

  • SHA512

    d79384c8ac91448697a76e378b581b5449a542cc03e7a7bcafb2e7cf9a99c138f25af515f06d6754a5ecd65334558720c2dd0cdfd43bfc65cfaf4271af64374d

  • SSDEEP

    6144:occccccccccccccccccccQE6idHSU5csqVm7X7Xc+tOGs+11pVZCblJgKWYb:PGyU5cO7tzVgWYb

Malware Config

Targets

    • Target

      2024-05-20_7a9fdb75863106b0285e3d51ba1f3d33_virlock

    • Size

      269KB

    • MD5

      7a9fdb75863106b0285e3d51ba1f3d33

    • SHA1

      c82d334ce57a704fdcb55516d9b889ae124452cd

    • SHA256

      e4313b20e9ea532734d763b5681326c40d5548e7879c6522c88dcf06bc8f6f9a

    • SHA512

      d79384c8ac91448697a76e378b581b5449a542cc03e7a7bcafb2e7cf9a99c138f25af515f06d6754a5ecd65334558720c2dd0cdfd43bfc65cfaf4271af64374d

    • SSDEEP

      6144:occccccccccccccccccccQE6idHSU5csqVm7X7Xc+tOGs+11pVZCblJgKWYb:PGyU5cO7tzVgWYb

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (81) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks