General

  • Target

    2024-08-08_a17e022915588aebd4a01f41e90063c2_virlock

  • Size

    657KB

  • Sample

    240808-h9yqxsvcrc

  • MD5

    a17e022915588aebd4a01f41e90063c2

  • SHA1

    769c1df990116bcbc28173bfdd227c92a96e3def

  • SHA256

    c5b01265c8627c77fe599f6b1889243a5d64961ad98ce2899d8adcbf689c5797

  • SHA512

    5aa79f4d2a8467da68510ddccc9b1c607c94e32b2c13ec0e9dcc58fd332e84ca132663775a5513fdf40ca04fe19c0342256427cffee7aa6baf290c62018be75c

  • SSDEEP

    12288:nFRbSnuTwp7KrswCalMq/JsPiyBXbYjOLN03:FRuuTwYrsIMmqvbrLN0

Malware Config

Targets

    • Target

      2024-08-08_a17e022915588aebd4a01f41e90063c2_virlock

    • Size

      657KB

    • MD5

      a17e022915588aebd4a01f41e90063c2

    • SHA1

      769c1df990116bcbc28173bfdd227c92a96e3def

    • SHA256

      c5b01265c8627c77fe599f6b1889243a5d64961ad98ce2899d8adcbf689c5797

    • SHA512

      5aa79f4d2a8467da68510ddccc9b1c607c94e32b2c13ec0e9dcc58fd332e84ca132663775a5513fdf40ca04fe19c0342256427cffee7aa6baf290c62018be75c

    • SSDEEP

      12288:nFRbSnuTwp7KrswCalMq/JsPiyBXbYjOLN03:FRuuTwYrsIMmqvbrLN0

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (54) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks