General

  • Target

    2024-05-25_32308b0d0e8528f0d01fbc144ff6114b_virlock

  • Size

    536KB

  • Sample

    240525-ea4w4sde52

  • MD5

    32308b0d0e8528f0d01fbc144ff6114b

  • SHA1

    6e688133572e008fb9b061955b1df5d8889e7ee6

  • SHA256

    fc264a3a0d281d67c3b066e0344f152ba525b499ca7b50a9da1dc4afb3904d5b

  • SHA512

    e1919b72766cf016b9d6ef9d3aa8befdc44bbebfdb64fe3555109ae34f572ee1d95b698adb223080dfafec0e9b8b55434d1ad554522475e1b2b1c015c9de34a1

  • SSDEEP

    12288:UL61oWIYSNECX2lJVP/pV5XGMvwnzvw2BQKfjNfiEGVJUI/:hgYUEV5PXsw+RfiF/U

Malware Config

Targets

    • Target

      2024-05-25_32308b0d0e8528f0d01fbc144ff6114b_virlock

    • Size

      536KB

    • MD5

      32308b0d0e8528f0d01fbc144ff6114b

    • SHA1

      6e688133572e008fb9b061955b1df5d8889e7ee6

    • SHA256

      fc264a3a0d281d67c3b066e0344f152ba525b499ca7b50a9da1dc4afb3904d5b

    • SHA512

      e1919b72766cf016b9d6ef9d3aa8befdc44bbebfdb64fe3555109ae34f572ee1d95b698adb223080dfafec0e9b8b55434d1ad554522475e1b2b1c015c9de34a1

    • SSDEEP

      12288:UL61oWIYSNECX2lJVP/pV5XGMvwnzvw2BQKfjNfiEGVJUI/:hgYUEV5PXsw+RfiF/U

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (59) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks