General

  • Target

    2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock

  • Size

    190KB

  • Sample

    240808-nkwsxswgmc

  • MD5

    e9abc8025a9ead22032dd851ac7084b2

  • SHA1

    f33271921b3645af0c584c3c71b82fc31f835754

  • SHA256

    c02e1a73f36d717a7ad3aebdd64edb1b723d585138521c0a41ce019590bc3ce0

  • SHA512

    a778a0bd89783b7c8bb273b800faa327e336b3ea95a0f7c52266ff2d056060d26999cb637d74ffadf596155455fed203dff6b926ade475ff5c296244bddba40b

  • SSDEEP

    3072:qgWwh/4OjzH5yAdv2qTFVXF6xs8wy8NGrbw4mzOgcGtJG:X+8dbRzep3bwBOgcU

Malware Config

Targets

    • Target

      2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock

    • Size

      190KB

    • MD5

      e9abc8025a9ead22032dd851ac7084b2

    • SHA1

      f33271921b3645af0c584c3c71b82fc31f835754

    • SHA256

      c02e1a73f36d717a7ad3aebdd64edb1b723d585138521c0a41ce019590bc3ce0

    • SHA512

      a778a0bd89783b7c8bb273b800faa327e336b3ea95a0f7c52266ff2d056060d26999cb637d74ffadf596155455fed203dff6b926ade475ff5c296244bddba40b

    • SSDEEP

      3072:qgWwh/4OjzH5yAdv2qTFVXF6xs8wy8NGrbw4mzOgcGtJG:X+8dbRzep3bwBOgcU

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (57) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks