General

  • Target

    2024-05-27_050e3910fcad0c9f286e2132b813472e_virlock

  • Size

    297KB

  • Sample

    240527-dxfx5afd93

  • MD5

    050e3910fcad0c9f286e2132b813472e

  • SHA1

    297be307ff856130207b9717f472710a89dc8ade

  • SHA256

    d088d8a382c73a598b6ab0527ca8a5fde9434c4c1a66090195a4535d1aef2261

  • SHA512

    7b38ea887ce9394652de8bf379944edc8695625b10ed2e064f5654b5483110051a1b3afefb468854875c0e64900d2a71f9712610225b4d248aea47fec4f3ea27

  • SSDEEP

    6144:7Y27TEjclEqGk0nwRtvBv+5J7ksMdNN1Onkq0gonMUhH:7YuT4clEqk0vBv+5xMbNSnRSFH

Malware Config

Targets

    • Target

      2024-05-27_050e3910fcad0c9f286e2132b813472e_virlock

    • Size

      297KB

    • MD5

      050e3910fcad0c9f286e2132b813472e

    • SHA1

      297be307ff856130207b9717f472710a89dc8ade

    • SHA256

      d088d8a382c73a598b6ab0527ca8a5fde9434c4c1a66090195a4535d1aef2261

    • SHA512

      7b38ea887ce9394652de8bf379944edc8695625b10ed2e064f5654b5483110051a1b3afefb468854875c0e64900d2a71f9712610225b4d248aea47fec4f3ea27

    • SSDEEP

      6144:7Y27TEjclEqGk0nwRtvBv+5J7ksMdNN1Onkq0gonMUhH:7YuT4clEqk0vBv+5xMbNSnRSFH

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (57) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks