General

  • Target

    2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock

  • Size

    117KB

  • Sample

    240706-mg5e8awcqm

  • MD5

    510df7297b8fc58e61240de0b057a3ec

  • SHA1

    588642fea8582cc8f998e621108e19cf996a7685

  • SHA256

    338a366ce094098ffd83fba25feaf918796a28ad18d82ac10e24376d7e4e069c

  • SHA512

    3085767116c202c07c2ef9926aec7c19c183dc3949f935eaa7a73b9e6c714d68b7b5508e30ed36b70560eba96cf9544d8459d2f6d84a4836a98020e010e738ce

  • SSDEEP

    1536:/0eUIanmCW7yQqb6HwXGlyNd8Fb6R6ydGea+p1lNyT1g6RI83nu9AjMA6HNT5Bp6:/0reyL2lcObheUE1lY1hb3oAj56LI

Malware Config

Targets

    • Target

      2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock

    • Size

      117KB

    • MD5

      510df7297b8fc58e61240de0b057a3ec

    • SHA1

      588642fea8582cc8f998e621108e19cf996a7685

    • SHA256

      338a366ce094098ffd83fba25feaf918796a28ad18d82ac10e24376d7e4e069c

    • SHA512

      3085767116c202c07c2ef9926aec7c19c183dc3949f935eaa7a73b9e6c714d68b7b5508e30ed36b70560eba96cf9544d8459d2f6d84a4836a98020e010e738ce

    • SSDEEP

      1536:/0eUIanmCW7yQqb6HwXGlyNd8Fb6R6ydGea+p1lNyT1g6RI83nu9AjMA6HNT5Bp6:/0reyL2lcObheUE1lY1hb3oAj56LI

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks