General

  • Target

    2024-05-24_1031226946f5659f7de7b3f417bed829_virlock

  • Size

    205KB

  • Sample

    240524-w1nfgsee8w

  • MD5

    1031226946f5659f7de7b3f417bed829

  • SHA1

    2cba95efd769945b2e7f8c794a737310cb78ae59

  • SHA256

    b762ebefcb7cde448237bf06e8e76d2c8aac0b8d50f7de2a72ec54ee495efab0

  • SHA512

    f4b9a8dcf481d55314533b8f7a8f9928edec03f30b65da42b0f9607c4d4ea3df09c2f31cbefadb1aee7c7dde4ee778ef3a7e286d1cfd092890ee6bdc6c5fec55

  • SSDEEP

    3072:TvCcDRmwA22Cw1sR8jaTJaDM9YK1Wbm/YOE3fUh61cANXbMIpFSp2zUqkgYh2GDa:T/nAjCcsWUJY9v3fUklwAU2zUbgYhb

Malware Config

Targets

    • Target

      2024-05-24_1031226946f5659f7de7b3f417bed829_virlock

    • Size

      205KB

    • MD5

      1031226946f5659f7de7b3f417bed829

    • SHA1

      2cba95efd769945b2e7f8c794a737310cb78ae59

    • SHA256

      b762ebefcb7cde448237bf06e8e76d2c8aac0b8d50f7de2a72ec54ee495efab0

    • SHA512

      f4b9a8dcf481d55314533b8f7a8f9928edec03f30b65da42b0f9607c4d4ea3df09c2f31cbefadb1aee7c7dde4ee778ef3a7e286d1cfd092890ee6bdc6c5fec55

    • SSDEEP

      3072:TvCcDRmwA22Cw1sR8jaTJaDM9YK1Wbm/YOE3fUh61cANXbMIpFSp2zUqkgYh2GDa:T/nAjCcsWUJY9v3fUklwAU2zUbgYhb

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks