General

  • Target

    20240824b9596fdc5ac3bfe9559004606e2f1a76virlock

  • Size

    196KB

  • Sample

    240824-nbxnvsxclg

  • MD5

    b9596fdc5ac3bfe9559004606e2f1a76

  • SHA1

    6b621dd3b6afd1703b241948214e14e6a2e7c662

  • SHA256

    e910492773e310dccac5f302c8edb6ac376c26c1a6076cd48d5507270aed0a38

  • SHA512

    596c953da01975a3f32ca8a5f8e4a30731a48434c92964858fe0b823848f11a8f71e4f126adc3e2cd53a0806926024289a4b125e42e92f39784dac368694f287

  • SSDEEP

    3072:/yBSMtbW9pm+de8O/4WZ9Q91Ac9nWoAughOzLRte+4HDVn6:/yB5tx+dm9QTAxOgsPRM+4HDA

Malware Config

Targets

    • Target

      20240824b9596fdc5ac3bfe9559004606e2f1a76virlock

    • Size

      196KB

    • MD5

      b9596fdc5ac3bfe9559004606e2f1a76

    • SHA1

      6b621dd3b6afd1703b241948214e14e6a2e7c662

    • SHA256

      e910492773e310dccac5f302c8edb6ac376c26c1a6076cd48d5507270aed0a38

    • SHA512

      596c953da01975a3f32ca8a5f8e4a30731a48434c92964858fe0b823848f11a8f71e4f126adc3e2cd53a0806926024289a4b125e42e92f39784dac368694f287

    • SSDEEP

      3072:/yBSMtbW9pm+de8O/4WZ9Q91Ac9nWoAughOzLRte+4HDVn6:/yB5tx+dm9QTAxOgsPRM+4HDA

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (53) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks