General

  • Target

    2024-05-25_61f78c6bc6b04043bca40fb9df30094e_virlock

  • Size

    647KB

  • Sample

    240525-fdbkeafa38

  • MD5

    61f78c6bc6b04043bca40fb9df30094e

  • SHA1

    1471babb9b9875b9b5511c648295b9c856cdfe66

  • SHA256

    103a620610e2ea4175d57b5a2482266fe8365184f4d5749d014f303ae35358b2

  • SHA512

    ba35e147d18494a8905017c04f2734b1af309df3d0c00c9e96b9cc8e9700f11a3448c03bcb4178803eb855b0ff48095ccc70d71244269e7ccdd3bb5b2367c149

  • SSDEEP

    12288:89D+6NeL/QU3HysVRO0yWeKAAqC1pUB62FjMe3+i1N49w6II/h531hijYQ0GJjzQ:8pobQyHysVRKWeKAAqC12wC

Malware Config

Targets

    • Target

      2024-05-25_61f78c6bc6b04043bca40fb9df30094e_virlock

    • Size

      647KB

    • MD5

      61f78c6bc6b04043bca40fb9df30094e

    • SHA1

      1471babb9b9875b9b5511c648295b9c856cdfe66

    • SHA256

      103a620610e2ea4175d57b5a2482266fe8365184f4d5749d014f303ae35358b2

    • SHA512

      ba35e147d18494a8905017c04f2734b1af309df3d0c00c9e96b9cc8e9700f11a3448c03bcb4178803eb855b0ff48095ccc70d71244269e7ccdd3bb5b2367c149

    • SSDEEP

      12288:89D+6NeL/QU3HysVRO0yWeKAAqC1pUB62FjMe3+i1N49w6II/h531hijYQ0GJjzQ:8pobQyHysVRKWeKAAqC12wC

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks