General

  • Target

    2024-07-10_e8eccb22ac810f40dc169a77969bcea8_virlock

  • Size

    210KB

  • Sample

    240710-mvsnksvhje

  • MD5

    e8eccb22ac810f40dc169a77969bcea8

  • SHA1

    8a3754e26aecca9ef06be2ef4f619dcb92497766

  • SHA256

    450ab05cdd9cfd3d6f1517bbd80da3781d6f3d61cb93fa861921941dba061672

  • SHA512

    87421bb8bfed5eff01e9d5159cccb15dff2fa7a3781511b91067453c5643d9f70c6e1402f72907ffef34caa8fc523761258ed51723358b95d3be9020a156918a

  • SSDEEP

    3072:2+vh6HUlfTAIcFk4JAJoblarmhuouNfA5Iq9cJwReOX+mVV7rBn4ybtdg:ZsK5cFrlvoNI6qeJwR9XVjrzb

Malware Config

Targets

    • Target

      2024-07-10_e8eccb22ac810f40dc169a77969bcea8_virlock

    • Size

      210KB

    • MD5

      e8eccb22ac810f40dc169a77969bcea8

    • SHA1

      8a3754e26aecca9ef06be2ef4f619dcb92497766

    • SHA256

      450ab05cdd9cfd3d6f1517bbd80da3781d6f3d61cb93fa861921941dba061672

    • SHA512

      87421bb8bfed5eff01e9d5159cccb15dff2fa7a3781511b91067453c5643d9f70c6e1402f72907ffef34caa8fc523761258ed51723358b95d3be9020a156918a

    • SSDEEP

      3072:2+vh6HUlfTAIcFk4JAJoblarmhuouNfA5Iq9cJwReOX+mVV7rBn4ybtdg:ZsK5cFrlvoNI6qeJwR9XVjrzb

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (55) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks