General

  • Target

    2024-07-05_54caf90fb12e3adfc06ad6aa4b6769b6_virlock

  • Size

    117KB

  • Sample

    240705-mgymnsygre

  • MD5

    54caf90fb12e3adfc06ad6aa4b6769b6

  • SHA1

    6751c26d7d8d92300538f11b255a7ccfa05aea46

  • SHA256

    0a8bdb6fa2311c0a003c5c2b509e600893fea6151255cc94bff3384de4d36253

  • SHA512

    32caa3f8989a8c888429731f4836c1609f7d8aea337568ed7d05bdefbddf2cfdf4218e4e5500bfc9bfbac384e656c050e3faf5c8e545f3d0f0499da47a228640

  • SSDEEP

    3072:P7O+PoONHRrnh29s1IAG6DxR/wrebz4zibfwuxJZu:C+P79Zh2i1I7GxVwrKzu

Malware Config

Targets

    • Target

      2024-07-05_54caf90fb12e3adfc06ad6aa4b6769b6_virlock

    • Size

      117KB

    • MD5

      54caf90fb12e3adfc06ad6aa4b6769b6

    • SHA1

      6751c26d7d8d92300538f11b255a7ccfa05aea46

    • SHA256

      0a8bdb6fa2311c0a003c5c2b509e600893fea6151255cc94bff3384de4d36253

    • SHA512

      32caa3f8989a8c888429731f4836c1609f7d8aea337568ed7d05bdefbddf2cfdf4218e4e5500bfc9bfbac384e656c050e3faf5c8e545f3d0f0499da47a228640

    • SSDEEP

      3072:P7O+PoONHRrnh29s1IAG6DxR/wrebz4zibfwuxJZu:C+P79Zh2i1I7GxVwrKzu

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (73) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks