General

  • Target

    202405221abe4dd26e95c3e1208a6f85eb58e88fvirlock

  • Size

    745KB

  • Sample

    240522-x8jmyadh23

  • MD5

    1abe4dd26e95c3e1208a6f85eb58e88f

  • SHA1

    7e44d3b3964c6d9b646d3d66a3eb74650aa1c6c6

  • SHA256

    84e126d58d94d8e7477b479f911c81dac33bf19ef55063a976c25008cbeabfa4

  • SHA512

    bb0a7004ee40f9d50ba5348f0799aa17bd347be75817e403cbbd1c57fe7c1d8019ec5b3c77520ffcbdf0917ea87f86042a942cfcf8a8efe22d66023f436edb72

  • SSDEEP

    12288:DhCKrEzbVSJqterUnOVlZcaiBZoziilvSz4HgewFIe/AnE8d8N:lC4EnmqkXaaiBZollhgepnE8qN

Malware Config

Targets

    • Target

      202405221abe4dd26e95c3e1208a6f85eb58e88fvirlock

    • Size

      745KB

    • MD5

      1abe4dd26e95c3e1208a6f85eb58e88f

    • SHA1

      7e44d3b3964c6d9b646d3d66a3eb74650aa1c6c6

    • SHA256

      84e126d58d94d8e7477b479f911c81dac33bf19ef55063a976c25008cbeabfa4

    • SHA512

      bb0a7004ee40f9d50ba5348f0799aa17bd347be75817e403cbbd1c57fe7c1d8019ec5b3c77520ffcbdf0917ea87f86042a942cfcf8a8efe22d66023f436edb72

    • SSDEEP

      12288:DhCKrEzbVSJqterUnOVlZcaiBZoziilvSz4HgewFIe/AnE8d8N:lC4EnmqkXaaiBZollhgepnE8qN

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (51) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks