General

  • Target

    202405243106b863aa4f39980f4d55a7c04ed3bdvirlock.exe

  • Size

    381KB

  • Sample

    240525-z1ltfaae7t

  • MD5

    3106b863aa4f39980f4d55a7c04ed3bd

  • SHA1

    33268bf8278c625707e9cc3068b63b17d56d92cc

  • SHA256

    1ca3875e956cf567e255254b0503fa8f4f12f057c714017f5517c8630ecef401

  • SHA512

    a6f62ea1d93986c2344089471566947b7e230fb0bf8ccbc0e9e38070fa1b04e58dfe9e8358baf5be2520f28867c3dd8b100e0e0229827748810c31ae054e87ab

  • SSDEEP

    6144:6Jz7/WYf1KVQIddj/hMoJgGqMqUZ0f1tULiDqBUuN4bgCnirx8K:W3xz8j/hMpMVa1tUmDqBUuN4ZnOx8K

Malware Config

Targets

    • Target

      202405243106b863aa4f39980f4d55a7c04ed3bdvirlock.exe

    • Size

      381KB

    • MD5

      3106b863aa4f39980f4d55a7c04ed3bd

    • SHA1

      33268bf8278c625707e9cc3068b63b17d56d92cc

    • SHA256

      1ca3875e956cf567e255254b0503fa8f4f12f057c714017f5517c8630ecef401

    • SHA512

      a6f62ea1d93986c2344089471566947b7e230fb0bf8ccbc0e9e38070fa1b04e58dfe9e8358baf5be2520f28867c3dd8b100e0e0229827748810c31ae054e87ab

    • SSDEEP

      6144:6Jz7/WYf1KVQIddj/hMoJgGqMqUZ0f1tULiDqBUuN4bgCnirx8K:W3xz8j/hMpMVa1tUmDqBUuN4ZnOx8K

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (80) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks