General

  • Target

    2024-07-25_b07e54c4de9a0aef6bfc68a717e60303_virlock

  • Size

    124KB

  • Sample

    240725-l2w4xavfla

  • MD5

    b07e54c4de9a0aef6bfc68a717e60303

  • SHA1

    f4ec76c8e8b6b19de773fbd48231f58d0715fbb9

  • SHA256

    747d83b2902f537c29a589abd2686c43c583699b29736f590812d8900ec6a7d7

  • SHA512

    737e9b6fb75ef7d809c393ab30d0ec0def4c4a107d3150575e4f219083b708a20147ed4306a691733ec461554fbe40c01f30121cd2d7c731e0ef34398f52db3d

  • SSDEEP

    3072:Z6Rcw0nieHyXdpghOOOxdJ8avmVknulaw6pb0RA6Xm:wd6D7hOOOxdCavm2nul1A

Malware Config

Targets

    • Target

      2024-07-25_b07e54c4de9a0aef6bfc68a717e60303_virlock

    • Size

      124KB

    • MD5

      b07e54c4de9a0aef6bfc68a717e60303

    • SHA1

      f4ec76c8e8b6b19de773fbd48231f58d0715fbb9

    • SHA256

      747d83b2902f537c29a589abd2686c43c583699b29736f590812d8900ec6a7d7

    • SHA512

      737e9b6fb75ef7d809c393ab30d0ec0def4c4a107d3150575e4f219083b708a20147ed4306a691733ec461554fbe40c01f30121cd2d7c731e0ef34398f52db3d

    • SSDEEP

      3072:Z6Rcw0nieHyXdpghOOOxdJ8avmVknulaw6pb0RA6Xm:wd6D7hOOOxdCavm2nul1A

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (81) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks