General

  • Target

    2024-05-23_7981ee8fb5feb1e456a6df731099203f_virlock

  • Size

    198KB

  • Sample

    240523-knqjjabb6z

  • MD5

    7981ee8fb5feb1e456a6df731099203f

  • SHA1

    d5fbec69da48308b6ffb5cc1cdf50d1856fcaa04

  • SHA256

    446c557908ba8220c60a45d9d3aa66243ce00f7bdeddd96b5300569c488aa992

  • SHA512

    965ced38c95ca1f6cdecd7d1b2c91a7cde44275e2391218f38756c19d100a0eaea04fcee6c762ead50337a84547378a27549cd4e4ab73f3bbff6aead56d7746c

  • SSDEEP

    3072:psonHfdGxWSSETyIZQnxTTuZAT73LY/qvg4sBd:p5yE9hJqZA33Tad

Malware Config

Targets

    • Target

      2024-05-23_7981ee8fb5feb1e456a6df731099203f_virlock

    • Size

      198KB

    • MD5

      7981ee8fb5feb1e456a6df731099203f

    • SHA1

      d5fbec69da48308b6ffb5cc1cdf50d1856fcaa04

    • SHA256

      446c557908ba8220c60a45d9d3aa66243ce00f7bdeddd96b5300569c488aa992

    • SHA512

      965ced38c95ca1f6cdecd7d1b2c91a7cde44275e2391218f38756c19d100a0eaea04fcee6c762ead50337a84547378a27549cd4e4ab73f3bbff6aead56d7746c

    • SSDEEP

      3072:psonHfdGxWSSETyIZQnxTTuZAT73LY/qvg4sBd:p5yE9hJqZA33Tad

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks