General

  • Target

    202408234f7428b9140621b76143b25250732689virlock

  • Size

    195KB

  • Sample

    240823-1ge28ayand

  • MD5

    4f7428b9140621b76143b25250732689

  • SHA1

    282d3622e417b1b15501da247011fc776cbe2651

  • SHA256

    c7f80944a293beab2a15f24a07a183f4ba3a1c3662aaafd0442dfd898c684dd2

  • SHA512

    c7a563b897ed8e539a3db76c827dc7ffafdf8db053d19e0dbdf0d413bb4641f9a37ba89245960b74beaac353680cd04182ab03eec3aa38dbb7cd797b42e32dc0

  • SSDEEP

    6144:kmo4YSNwA8JzaiU9MzQQjtlixVsmyMdcbYwL:vo4hys9MkQjtludsFL

Malware Config

Targets

    • Target

      202408234f7428b9140621b76143b25250732689virlock

    • Size

      195KB

    • MD5

      4f7428b9140621b76143b25250732689

    • SHA1

      282d3622e417b1b15501da247011fc776cbe2651

    • SHA256

      c7f80944a293beab2a15f24a07a183f4ba3a1c3662aaafd0442dfd898c684dd2

    • SHA512

      c7a563b897ed8e539a3db76c827dc7ffafdf8db053d19e0dbdf0d413bb4641f9a37ba89245960b74beaac353680cd04182ab03eec3aa38dbb7cd797b42e32dc0

    • SSDEEP

      6144:kmo4YSNwA8JzaiU9MzQQjtlixVsmyMdcbYwL:vo4hys9MkQjtludsFL

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (54) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks