General

  • Target

    2024-05-21_8f12f6672e3a30bea49592af840f6d93_virlock

  • Size

    117KB

  • Sample

    240521-2ay27acc59

  • MD5

    8f12f6672e3a30bea49592af840f6d93

  • SHA1

    b67d1459060b1d16917d68151e64c4286fbe91c2

  • SHA256

    3c7abd7432b74c6f258cf94c6ced8ead24d75fdd98290ac4a8b794839a6971c9

  • SHA512

    36330d2ec44307aae5db01055d104b4c20525f0a7614aaa9c9bb1233d59e00f36788fd59a224cc154f425239a6bde5e85e4a1fea3230857a75e90fa53d6b2c03

  • SSDEEP

    3072:9X75hp2S75mWgAs68JNkl98pMT8DzZ1y3K9Hk0:N75hDdmDv68JNkl98zykr

Malware Config

Targets

    • Target

      2024-05-21_8f12f6672e3a30bea49592af840f6d93_virlock

    • Size

      117KB

    • MD5

      8f12f6672e3a30bea49592af840f6d93

    • SHA1

      b67d1459060b1d16917d68151e64c4286fbe91c2

    • SHA256

      3c7abd7432b74c6f258cf94c6ced8ead24d75fdd98290ac4a8b794839a6971c9

    • SHA512

      36330d2ec44307aae5db01055d104b4c20525f0a7614aaa9c9bb1233d59e00f36788fd59a224cc154f425239a6bde5e85e4a1fea3230857a75e90fa53d6b2c03

    • SSDEEP

      3072:9X75hp2S75mWgAs68JNkl98pMT8DzZ1y3K9Hk0:N75hDdmDv68JNkl98zykr

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (85) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.