General

  • Target

    2024-06-12_55de70bc3914aeaccf2fe023dc594ca2_virlock

  • Size

    117KB

  • Sample

    240612-gtlkzssera

  • MD5

    55de70bc3914aeaccf2fe023dc594ca2

  • SHA1

    0fa654223b4eb079fac105d51ed287d05332a731

  • SHA256

    8b97f2021fd52e07b35cec901ea6b0f348250874ebf5d762e6fdfbd1c94fa9d2

  • SHA512

    d8a90813fa010accb8f89273f398fe7ff3694ec7f634c7e35b123c08b1e179a1ec9660caffc067510731a2c550eceb057a1e608ee5bc592c8499613af41f7c19

  • SSDEEP

    3072:LHRPzuupSr7TuZoD4yYX+/j42RPsP8Vp266xy1AWTC:LxPznpI7TWo0yYu/22rAs

Malware Config

Targets

    • Target

      2024-06-12_55de70bc3914aeaccf2fe023dc594ca2_virlock

    • Size

      117KB

    • MD5

      55de70bc3914aeaccf2fe023dc594ca2

    • SHA1

      0fa654223b4eb079fac105d51ed287d05332a731

    • SHA256

      8b97f2021fd52e07b35cec901ea6b0f348250874ebf5d762e6fdfbd1c94fa9d2

    • SHA512

      d8a90813fa010accb8f89273f398fe7ff3694ec7f634c7e35b123c08b1e179a1ec9660caffc067510731a2c550eceb057a1e608ee5bc592c8499613af41f7c19

    • SSDEEP

      3072:LHRPzuupSr7TuZoD4yYX+/j42RPsP8Vp266xy1AWTC:LxPznpI7TWo0yYu/22rAs

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (94) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks