General

  • Target

    2024-05-24_2b899d75597f22a59ab42328f07e8770_virlock

  • Size

    296KB

  • Sample

    240524-mhgqjsdg57

  • MD5

    2b899d75597f22a59ab42328f07e8770

  • SHA1

    1ec1df76a487ff30dd7600b7ff039bf262a03cb3

  • SHA256

    2105067d4ddc353aa9cb775f263f68bfe833f023f86a521404a8c9574e31439a

  • SHA512

    e703cabb21b4430086048249ec2657d53196a075c12d7a80aa46ba5fac0aecf72aba573e32b97655ec41170f998120e03be985a1fab13d7c0139c4cbd4144aca

  • SSDEEP

    6144:L6sLm3tasrTmRNiNto8QGmlq6NSaLgHNTe1fpT5o:LsBrTKwrKl9ZEHNTUa

Malware Config

Targets

    • Target

      2024-05-24_2b899d75597f22a59ab42328f07e8770_virlock

    • Size

      296KB

    • MD5

      2b899d75597f22a59ab42328f07e8770

    • SHA1

      1ec1df76a487ff30dd7600b7ff039bf262a03cb3

    • SHA256

      2105067d4ddc353aa9cb775f263f68bfe833f023f86a521404a8c9574e31439a

    • SHA512

      e703cabb21b4430086048249ec2657d53196a075c12d7a80aa46ba5fac0aecf72aba573e32b97655ec41170f998120e03be985a1fab13d7c0139c4cbd4144aca

    • SSDEEP

      6144:L6sLm3tasrTmRNiNto8QGmlq6NSaLgHNTe1fpT5o:LsBrTKwrKl9ZEHNTUa

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks