General
-
Target
2024-06-01_e0f27af1cfe25b64c404b5e9588fee3f_virlock
-
Size
564KB
-
Sample
240601-j2nfnafa3v
-
MD5
e0f27af1cfe25b64c404b5e9588fee3f
-
SHA1
bfb96bb51ac4b7be1706738f740051b51c7e0f03
-
SHA256
64d8ee860c9b33f8203457e09d596b419bdf45e3423586f048478d45f10abf06
-
SHA512
f34bf79112701a80dc220cb444e42a7c181168e5b54d6105b40655c57244d84751c30dd3c5cdca442bbbc32d32d87403e8e33a1e61e8c0a3ac05611143baebba
-
SSDEEP
12288:mxPvqDrhjzdUEgmhHUuH4f8E1bP/vfa98a:mxPv6ROWhHhHuNDvfi
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_e0f27af1cfe25b64c404b5e9588fee3f_virlock.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-01_e0f27af1cfe25b64c404b5e9588fee3f_virlock.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-01_e0f27af1cfe25b64c404b5e9588fee3f_virlock
-
Size
564KB
-
MD5
e0f27af1cfe25b64c404b5e9588fee3f
-
SHA1
bfb96bb51ac4b7be1706738f740051b51c7e0f03
-
SHA256
64d8ee860c9b33f8203457e09d596b419bdf45e3423586f048478d45f10abf06
-
SHA512
f34bf79112701a80dc220cb444e42a7c181168e5b54d6105b40655c57244d84751c30dd3c5cdca442bbbc32d32d87403e8e33a1e61e8c0a3ac05611143baebba
-
SSDEEP
12288:mxPvqDrhjzdUEgmhHUuH4f8E1bP/vfa98a:mxPv6ROWhHhHuNDvfi
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1