General

  • Target

    2024-05-23_10651c37469a05dca5c5dd5ad3b7c830_virlock

  • Size

    206KB

  • Sample

    240523-xewqeacc4x

  • MD5

    10651c37469a05dca5c5dd5ad3b7c830

  • SHA1

    8d629731228658bc85fe8110992a3befcb772130

  • SHA256

    1d96ce6eef0d47ba0dd3b0d7205ba1ab16533cdab176ea9ca81d8d7807ae6a6c

  • SHA512

    55bf0ead82a8942fdd7e7ee1a51a0ff5cf4e0e187e0fed2465a429ea3d6917099469d56d22ad125bbb71dd2880f3dd82ade40c64559b2a70eb729dd595bef24b

  • SSDEEP

    3072:wbCFEsbDdXH6N7UZVPuT9RRNfJ0WQDdsWJqO4Y41KgDbrzvDLtI:ZSUKyVc8d/JqH7sgvDLy

Malware Config

Targets

    • Target

      2024-05-23_10651c37469a05dca5c5dd5ad3b7c830_virlock

    • Size

      206KB

    • MD5

      10651c37469a05dca5c5dd5ad3b7c830

    • SHA1

      8d629731228658bc85fe8110992a3befcb772130

    • SHA256

      1d96ce6eef0d47ba0dd3b0d7205ba1ab16533cdab176ea9ca81d8d7807ae6a6c

    • SHA512

      55bf0ead82a8942fdd7e7ee1a51a0ff5cf4e0e187e0fed2465a429ea3d6917099469d56d22ad125bbb71dd2880f3dd82ade40c64559b2a70eb729dd595bef24b

    • SSDEEP

      3072:wbCFEsbDdXH6N7UZVPuT9RRNfJ0WQDdsWJqO4Y41KgDbrzvDLtI:ZSUKyVc8d/JqH7sgvDLy

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (57) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

4
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks