General

  • Target

    2024-06-30_0a4cc079e7054e103640ce45eedb4c9c_virlock

  • Size

    115KB

  • Sample

    240630-njgbvazfnk

  • MD5

    0a4cc079e7054e103640ce45eedb4c9c

  • SHA1

    2d2be05b3f76f2df2303602310c1e7c51e6438d2

  • SHA256

    58416ad31509e24a2a378b6b276ec2cbd2e8a53ee1de6d2df640afaffde901f6

  • SHA512

    019827644985b39982295cb49803eda4438d032cefb5c7166ac4b368db678882357f3ad1f5dcef8a891595f5c5eed8faab2f2fa9b5283cf95080d6cdc0171308

  • SSDEEP

    1536:m/w/IPksGHiyoliP75kjb9kTwsKlo3IL0OxGcTacbD6T622VQDPKufp72QTIIbHz:oPksGHiwNgb9WwzoQrbDhgPKeU+bG

Malware Config

Targets

    • Target

      2024-06-30_0a4cc079e7054e103640ce45eedb4c9c_virlock

    • Size

      115KB

    • MD5

      0a4cc079e7054e103640ce45eedb4c9c

    • SHA1

      2d2be05b3f76f2df2303602310c1e7c51e6438d2

    • SHA256

      58416ad31509e24a2a378b6b276ec2cbd2e8a53ee1de6d2df640afaffde901f6

    • SHA512

      019827644985b39982295cb49803eda4438d032cefb5c7166ac4b368db678882357f3ad1f5dcef8a891595f5c5eed8faab2f2fa9b5283cf95080d6cdc0171308

    • SSDEEP

      1536:m/w/IPksGHiyoliP75kjb9kTwsKlo3IL0OxGcTacbD6T622VQDPKufp72QTIIbHz:oPksGHiwNgb9WwzoQrbDhgPKeU+bG

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks