General
-
Target
202405237fc79caa7541966cf46b0a871e17f7d9virlock
-
Size
645KB
-
Sample
240525-zv4gasad2w
-
MD5
7fc79caa7541966cf46b0a871e17f7d9
-
SHA1
27630fd69f0dc90f144fb0c6d20f7a63e2eae3d7
-
SHA256
10d4516c85859177c93ad4125e95490dc9dcce11a3b5c67a81e0545473afd798
-
SHA512
5d53a2c187f6ff0201126c5bb933563df64ccd1c5c2eb6e76049ae32ac63b8d08c4b5057b873830392a57b954dba600dae4ecdf5e49f8857f9517ec733c03961
-
SSDEEP
12288:F4njaiOk5isF+SiShRc8Xq9miG/F9OvWK9dv:SaiT5isISiF9PWId
Static task
static1
Behavioral task
behavioral1
Sample
202405237fc79caa7541966cf46b0a871e17f7d9virlock.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
202405237fc79caa7541966cf46b0a871e17f7d9virlock.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
202405237fc79caa7541966cf46b0a871e17f7d9virlock
-
Size
645KB
-
MD5
7fc79caa7541966cf46b0a871e17f7d9
-
SHA1
27630fd69f0dc90f144fb0c6d20f7a63e2eae3d7
-
SHA256
10d4516c85859177c93ad4125e95490dc9dcce11a3b5c67a81e0545473afd798
-
SHA512
5d53a2c187f6ff0201126c5bb933563df64ccd1c5c2eb6e76049ae32ac63b8d08c4b5057b873830392a57b954dba600dae4ecdf5e49f8857f9517ec733c03961
-
SSDEEP
12288:F4njaiOk5isF+SiShRc8Xq9miG/F9OvWK9dv:SaiT5isISiF9PWId
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (53) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1