General

  • Target

    2024-08-10_07830947775ffe180dd53ebfdcfe237c_virlock

  • Size

    599KB

  • Sample

    240810-brk9jsyhkn

  • MD5

    07830947775ffe180dd53ebfdcfe237c

  • SHA1

    ded5f62af4d3c831c6d062ee34d52109a8a7c2bc

  • SHA256

    79c6215f9e4aa986d244259ffc28355049575d6ae8ec90b69475f085fa33e990

  • SHA512

    cc05e3d886dd8c7f5e42d8881b4ae5b732ed446723cb12cd0228707aaf6eb28105180431581c8b6cda63dcaa5d73e8ecf956e179bba7d5151e22ecf7b628132e

  • SSDEEP

    12288:/IX3BmHJwOR0euRI5g23Ser9LGWge5XdKf8OkPuXuLPL3hm1Tp5y4NTCDesPVoJd:/SmiX23SeJype5XdKf8OkPuXuLPL3hmZ

Malware Config

Targets

    • Target

      2024-08-10_07830947775ffe180dd53ebfdcfe237c_virlock

    • Size

      599KB

    • MD5

      07830947775ffe180dd53ebfdcfe237c

    • SHA1

      ded5f62af4d3c831c6d062ee34d52109a8a7c2bc

    • SHA256

      79c6215f9e4aa986d244259ffc28355049575d6ae8ec90b69475f085fa33e990

    • SHA512

      cc05e3d886dd8c7f5e42d8881b4ae5b732ed446723cb12cd0228707aaf6eb28105180431581c8b6cda63dcaa5d73e8ecf956e179bba7d5151e22ecf7b628132e

    • SSDEEP

      12288:/IX3BmHJwOR0euRI5g23Ser9LGWge5XdKf8OkPuXuLPL3hm1Tp5y4NTCDesPVoJd:/SmiX23SeJype5XdKf8OkPuXuLPL3hmZ

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks