General

  • Target

    20240524b049b2933a0c6722b3d74bf71f1ce27evirlock.exe

  • Size

    345KB

  • Sample

    240525-z8vfjsbd48

  • MD5

    b049b2933a0c6722b3d74bf71f1ce27e

  • SHA1

    4ee861e07577d646573955e1f63036fa88f9780a

  • SHA256

    662352bc682e012e257e51d8673fc30757c084525dd8d7288a05c0f76431fa0b

  • SHA512

    5794447c3185f53212bb83da67edc25c482e682d660a8266775133d623add0f35415f67f3a0183a5cdcf821a129dd6bac5c1b8ef3c16f9ca4efcbfa36fbc1424

  • SSDEEP

    6144:uJy+IwdHzSIVfK4U4+9ijMhRzlwDwzz0eIIIIIIIIIIIIIIIIIIII4IIIIIIIIIE:0Fla4E9iIhReK3U

Malware Config

Targets

    • Target

      20240524b049b2933a0c6722b3d74bf71f1ce27evirlock.exe

    • Size

      345KB

    • MD5

      b049b2933a0c6722b3d74bf71f1ce27e

    • SHA1

      4ee861e07577d646573955e1f63036fa88f9780a

    • SHA256

      662352bc682e012e257e51d8673fc30757c084525dd8d7288a05c0f76431fa0b

    • SHA512

      5794447c3185f53212bb83da67edc25c482e682d660a8266775133d623add0f35415f67f3a0183a5cdcf821a129dd6bac5c1b8ef3c16f9ca4efcbfa36fbc1424

    • SSDEEP

      6144:uJy+IwdHzSIVfK4U4+9ijMhRzlwDwzz0eIIIIIIIIIIIIIIIIIIII4IIIIIIIIIE:0Fla4E9iIhReK3U

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (89) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks