General

  • Target

    2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock

  • Size

    202KB

  • Sample

    240525-nstcrsfd95

  • MD5

    6db37117e8c0e5aeba603cbb6b97b82c

  • SHA1

    f81aa8cec4472771da6a97eab56f9bced6fb4ec3

  • SHA256

    baf8a44716c5f3cdceba80c4829c1dfe1cf85f70738ed7751300c94399a466f1

  • SHA512

    c6886cd3de301f9bcc540a9ff9acbb95a196a8c9ec69023e1281d7033f1fd12a6623a665b5878f246cf56e04e8e3275b72cf03f814d2a22ee78a1518f0c020ff

  • SSDEEP

    3072:290rs48O0lrcIX5i7RlDRvo2GBmQIg51uHR69+tcliXrOyswHu5TTxU28r4/:26ErLpiHZo2+mng51uHGOWiXrU6B4/

Malware Config

Targets

    • Target

      2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock

    • Size

      202KB

    • MD5

      6db37117e8c0e5aeba603cbb6b97b82c

    • SHA1

      f81aa8cec4472771da6a97eab56f9bced6fb4ec3

    • SHA256

      baf8a44716c5f3cdceba80c4829c1dfe1cf85f70738ed7751300c94399a466f1

    • SHA512

      c6886cd3de301f9bcc540a9ff9acbb95a196a8c9ec69023e1281d7033f1fd12a6623a665b5878f246cf56e04e8e3275b72cf03f814d2a22ee78a1518f0c020ff

    • SSDEEP

      3072:290rs48O0lrcIX5i7RlDRvo2GBmQIg51uHR69+tcliXrOyswHu5TTxU28r4/:26ErLpiHZo2+mng51uHGOWiXrU6B4/

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (60) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks