General
-
Target
2024-06-12_55de70bc3914aeaccf2fe023dc594ca2_virlock
-
Size
117KB
-
Sample
240612-gtlkzssera
-
MD5
55de70bc3914aeaccf2fe023dc594ca2
-
SHA1
0fa654223b4eb079fac105d51ed287d05332a731
-
SHA256
8b97f2021fd52e07b35cec901ea6b0f348250874ebf5d762e6fdfbd1c94fa9d2
-
SHA512
d8a90813fa010accb8f89273f398fe7ff3694ec7f634c7e35b123c08b1e179a1ec9660caffc067510731a2c550eceb057a1e608ee5bc592c8499613af41f7c19
-
SSDEEP
3072:LHRPzuupSr7TuZoD4yYX+/j42RPsP8Vp266xy1AWTC:LxPznpI7TWo0yYu/22rAs
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-12_55de70bc3914aeaccf2fe023dc594ca2_virlock.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-12_55de70bc3914aeaccf2fe023dc594ca2_virlock.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-12_55de70bc3914aeaccf2fe023dc594ca2_virlock
-
Size
117KB
-
MD5
55de70bc3914aeaccf2fe023dc594ca2
-
SHA1
0fa654223b4eb079fac105d51ed287d05332a731
-
SHA256
8b97f2021fd52e07b35cec901ea6b0f348250874ebf5d762e6fdfbd1c94fa9d2
-
SHA512
d8a90813fa010accb8f89273f398fe7ff3694ec7f634c7e35b123c08b1e179a1ec9660caffc067510731a2c550eceb057a1e608ee5bc592c8499613af41f7c19
-
SSDEEP
3072:LHRPzuupSr7TuZoD4yYX+/j42RPsP8Vp266xy1AWTC:LxPznpI7TWo0yYu/22rAs
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (94) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1