General

  • Target

    2024-05-24_c5ade1249b697bff9f1669273d995126_virlock

  • Size

    781KB

  • Sample

    240524-lln4cscg95

  • MD5

    c5ade1249b697bff9f1669273d995126

  • SHA1

    4c86e0a00650749fd7f3fc87e833cac3f02c3099

  • SHA256

    f0ffe1a5c10bdc63291948ef46993f315e3fb1d91d36e51bf122f912cfa9194f

  • SHA512

    5e9449a23c053c98733f9acf1e81bc37c3672fd5c5f59f154991d5f30640ffd567d8b8c3c269da9cdfc7757732b48305198e4396839a67dc177a7e7a766d6e0c

  • SSDEEP

    3072:1PsNcZ5+daJPOomc2Umo9dc6bgwuvFG4Xibytnz9kHjMWJwFLF1J3m:tOcHsa4fP1gH6fimBJcR0pm

Malware Config

Targets

    • Target

      2024-05-24_c5ade1249b697bff9f1669273d995126_virlock

    • Size

      781KB

    • MD5

      c5ade1249b697bff9f1669273d995126

    • SHA1

      4c86e0a00650749fd7f3fc87e833cac3f02c3099

    • SHA256

      f0ffe1a5c10bdc63291948ef46993f315e3fb1d91d36e51bf122f912cfa9194f

    • SHA512

      5e9449a23c053c98733f9acf1e81bc37c3672fd5c5f59f154991d5f30640ffd567d8b8c3c269da9cdfc7757732b48305198e4396839a67dc177a7e7a766d6e0c

    • SSDEEP

      3072:1PsNcZ5+daJPOomc2Umo9dc6bgwuvFG4Xibytnz9kHjMWJwFLF1J3m:tOcHsa4fP1gH6fimBJcR0pm

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (60) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks