General

  • Target

    2024-08-23_7282f390606e6fe13a6dc8c26540f8ce_virlock

  • Size

    199KB

  • Sample

    240823-nfmpfstcrn

  • MD5

    7282f390606e6fe13a6dc8c26540f8ce

  • SHA1

    bba81d131740776a63f812a7034f2eb27fbf8479

  • SHA256

    00dd825b460b1c498a167515eb6e6260acf4f4b61e99e037dd608ad2f8a2d87a

  • SHA512

    3c915d0d204e397ebef3634819a268776be4a3f23765d2f1513e0a4c8869a2b03d399e3ca8cfa030fcdee0aabb389605f389690f29fbc9e34fcc4f6152a1ce16

  • SSDEEP

    3072:PN24wpUPQcxoG2ljg0ZL7vKRTqxGgGyZazauMvIBe2GOEKs/xb6GC4a:GpncCG2lZL7vKRiGgGymxMveGzKOb68a

Malware Config

Targets

    • Target

      2024-08-23_7282f390606e6fe13a6dc8c26540f8ce_virlock

    • Size

      199KB

    • MD5

      7282f390606e6fe13a6dc8c26540f8ce

    • SHA1

      bba81d131740776a63f812a7034f2eb27fbf8479

    • SHA256

      00dd825b460b1c498a167515eb6e6260acf4f4b61e99e037dd608ad2f8a2d87a

    • SHA512

      3c915d0d204e397ebef3634819a268776be4a3f23765d2f1513e0a4c8869a2b03d399e3ca8cfa030fcdee0aabb389605f389690f29fbc9e34fcc4f6152a1ce16

    • SSDEEP

      3072:PN24wpUPQcxoG2ljg0ZL7vKRTqxGgGyZazauMvIBe2GOEKs/xb6GC4a:GpncCG2lZL7vKRiGgGymxMveGzKOb68a

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (59) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks