General

  • Target

    20240520923990324cff93ddfeed10e82df92c81virlock_NeikiAnalytics

  • Size

    760KB

  • Sample

    240521-j3696aeb5y

  • MD5

    923990324cff93ddfeed10e82df92c81

  • SHA1

    68740dbc6efc92eabe0bfc24b9a0506d3e0b7a2b

  • SHA256

    9b58fd432c44f717ab537784e022315406499a353de11b0e9883f2f804a2b22c

  • SHA512

    e2e7c12a3fa3c38e8a188a04e2802ae223ade597102f1161ac9d51b3208e53979e4075459c474e846f8754647fb58c58d649297776dbf6c9dbfecc5db5523998

  • SSDEEP

    12288:BX7e5QkPfMRoDSlHQTFzGac5rrAsXh2sGnCYfenTYcSN/za:Bre5xE6Dm4FzG5rNGnDuEcG7a

Malware Config

Targets

    • Target

      20240520923990324cff93ddfeed10e82df92c81virlock_NeikiAnalytics

    • Size

      760KB

    • MD5

      923990324cff93ddfeed10e82df92c81

    • SHA1

      68740dbc6efc92eabe0bfc24b9a0506d3e0b7a2b

    • SHA256

      9b58fd432c44f717ab537784e022315406499a353de11b0e9883f2f804a2b22c

    • SHA512

      e2e7c12a3fa3c38e8a188a04e2802ae223ade597102f1161ac9d51b3208e53979e4075459c474e846f8754647fb58c58d649297776dbf6c9dbfecc5db5523998

    • SSDEEP

      12288:BX7e5QkPfMRoDSlHQTFzGac5rrAsXh2sGnCYfenTYcSN/za:Bre5xE6Dm4FzG5rNGnDuEcG7a

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (55) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks