General

  • Target

    202405223f0c845467b75b09102609b7a2c31b50virlock

  • Size

    185KB

  • Sample

    240522-x3fdbsde3x

  • MD5

    3f0c845467b75b09102609b7a2c31b50

  • SHA1

    69d96b9d5bf8e47550541158ab94d3fc498a6b61

  • SHA256

    f9c0068ff988ec359ed3da3c6e4910302b9b50cf5e4cfbb512f8ef57f90d581e

  • SHA512

    345184fa284c0f9abb9ffd22e21e541313cef3bccb6bb9fc75e589c4c0aaa66cddfd0546e9e4015a0c0dbb4837135f6bfa6fac28437098741f2a43ab1cf28c01

  • SSDEEP

    3072:cVaq5FcYT5BbZYP/6pfVSSsORkMaibfpKG/7Qx0KgxGdjNuGtb/j4bljcEhk4Bm9:ufz5pZYPypff7tjxojI43ohk4

Malware Config

Targets

    • Target

      202405223f0c845467b75b09102609b7a2c31b50virlock

    • Size

      185KB

    • MD5

      3f0c845467b75b09102609b7a2c31b50

    • SHA1

      69d96b9d5bf8e47550541158ab94d3fc498a6b61

    • SHA256

      f9c0068ff988ec359ed3da3c6e4910302b9b50cf5e4cfbb512f8ef57f90d581e

    • SHA512

      345184fa284c0f9abb9ffd22e21e541313cef3bccb6bb9fc75e589c4c0aaa66cddfd0546e9e4015a0c0dbb4837135f6bfa6fac28437098741f2a43ab1cf28c01

    • SSDEEP

      3072:cVaq5FcYT5BbZYP/6pfVSSsORkMaibfpKG/7Qx0KgxGdjNuGtb/j4bljcEhk4Bm9:ufz5pZYPypff7tjxojI43ohk4

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (63) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks