General

  • Target

    2024-05-23_f36aff485a3937cf973ebb1c5cd08f19_virlock

  • Size

    897KB

  • Sample

    240523-ygr1nsea54

  • MD5

    f36aff485a3937cf973ebb1c5cd08f19

  • SHA1

    c4c7a710d2d1170fd061d381b6c72abb30bd4dc9

  • SHA256

    d380501b4c9c646f331d46a7c8a8a065879556fe526a97a3060aa106b6607956

  • SHA512

    b9a7b9885b7ac34ccc2bc86c6ba6bca6b33c2dbbfd3c48da42766e4ed065d085dff46e23ed8a77f409faf0b89722684b96f1be745ffe1702cea362a43f74ddf3

  • SSDEEP

    24576:IZUcAxHGyCKIFxUZYuF4yLZAt4v4xM9W5rLg:IZYGyCTFxUZ+yLZAt4v4Cs5

Malware Config

Targets

    • Target

      2024-05-23_f36aff485a3937cf973ebb1c5cd08f19_virlock

    • Size

      897KB

    • MD5

      f36aff485a3937cf973ebb1c5cd08f19

    • SHA1

      c4c7a710d2d1170fd061d381b6c72abb30bd4dc9

    • SHA256

      d380501b4c9c646f331d46a7c8a8a065879556fe526a97a3060aa106b6607956

    • SHA512

      b9a7b9885b7ac34ccc2bc86c6ba6bca6b33c2dbbfd3c48da42766e4ed065d085dff46e23ed8a77f409faf0b89722684b96f1be745ffe1702cea362a43f74ddf3

    • SSDEEP

      24576:IZUcAxHGyCKIFxUZYuF4yLZAt4v4xM9W5rLg:IZYGyCTFxUZ+yLZAt4v4Cs5

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks