General

  • Target

    2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock

  • Size

    189KB

  • Sample

    240525-yl3yqsgf75

  • MD5

    6d874e41449792478345cbc917bfbb5d

  • SHA1

    3a8888f4cb9cf6490afc04e80177dd37b445ada2

  • SHA256

    a751a60b06499e204d9abfaf588df1954c2d0b33226bc426473907256147a389

  • SHA512

    ba3242860f70f46a39351ca4c51534cfafc6d3126817ada92a7200d1b8a5938d8a5c2760ada050d455ed08f03aa8c309e4696e3d3f1a1ea15856fd78ec7e4c0d

  • SSDEEP

    3072:2ieAr74wFkOLyIwxUwwwW2NMwowwS46mMFRwqgLYbXzooHj1WcL6+20+7XHpksii:3KaM46mMFRwqgLYbXzooHj1Wy6xDXJkq

Malware Config

Targets

    • Target

      2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock

    • Size

      189KB

    • MD5

      6d874e41449792478345cbc917bfbb5d

    • SHA1

      3a8888f4cb9cf6490afc04e80177dd37b445ada2

    • SHA256

      a751a60b06499e204d9abfaf588df1954c2d0b33226bc426473907256147a389

    • SHA512

      ba3242860f70f46a39351ca4c51534cfafc6d3126817ada92a7200d1b8a5938d8a5c2760ada050d455ed08f03aa8c309e4696e3d3f1a1ea15856fd78ec7e4c0d

    • SSDEEP

      3072:2ieAr74wFkOLyIwxUwwwW2NMwowwS46mMFRwqgLYbXzooHj1WcL6+20+7XHpksii:3KaM46mMFRwqgLYbXzooHj1Wy6xDXJkq

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks