General

  • Target

    2024-08-21_b0a3f861edd4c35c9531ea9c1397ec1c_virlock

  • Size

    1.0MB

  • Sample

    240821-eenqpasejk

  • MD5

    b0a3f861edd4c35c9531ea9c1397ec1c

  • SHA1

    de8df0d6b5a8c43b1fe7cb69420313ea36ae42ec

  • SHA256

    2c5b6d6797f76ed0e2002fe5bc5ac3f1a1b0b1db947c2a986ac1def73c00c85e

  • SHA512

    27e621d9c6d22fc4db370f31618ebadb4a702c16967e37947c0ad7fe36e7e6bfaa9e6b57dbde6180fe158dc69afb7cd79d62f2979c3731e74df0c2b445a46df0

  • SSDEEP

    24576:B8j/I+jUGQKo7kp8sNarx750te5PjqVt68nFxUPS0jso+:OjhjSoXfiu/6k/UPNjs

Malware Config

Targets

    • Target

      2024-08-21_b0a3f861edd4c35c9531ea9c1397ec1c_virlock

    • Size

      1.0MB

    • MD5

      b0a3f861edd4c35c9531ea9c1397ec1c

    • SHA1

      de8df0d6b5a8c43b1fe7cb69420313ea36ae42ec

    • SHA256

      2c5b6d6797f76ed0e2002fe5bc5ac3f1a1b0b1db947c2a986ac1def73c00c85e

    • SHA512

      27e621d9c6d22fc4db370f31618ebadb4a702c16967e37947c0ad7fe36e7e6bfaa9e6b57dbde6180fe158dc69afb7cd79d62f2979c3731e74df0c2b445a46df0

    • SSDEEP

      24576:B8j/I+jUGQKo7kp8sNarx750te5PjqVt68nFxUPS0jso+:OjhjSoXfiu/6k/UPNjs

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (63) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks