General

  • Target

    2024-08-25_a4f26a15f80707e2f143dd9a7cb633db_virlock

  • Size

    2.6MB

  • Sample

    240825-cp371sscqe

  • MD5

    a4f26a15f80707e2f143dd9a7cb633db

  • SHA1

    ff95de27eed7f36bbf4f19833fc5b96aaff95ae4

  • SHA256

    a7e6ed78900e0a42d1efd857936077c00da9395f377786a60d0eb36cf6194253

  • SHA512

    5bb13d8f05b48cda150eb8c62c1f9e3c851cdfdc7e51877822db26e14121c575a56e9664a0bc414bef2c6b2afb92671dcfa4ac23abbf730b7729955cf0851a92

  • SSDEEP

    49152:+AvymXkAuC7LcGfed9ygU8s8hwMQ//QmL1kvPv/:dymXkAXlfed9ygU8FQ/J8

Malware Config

Targets

    • Target

      2024-08-25_a4f26a15f80707e2f143dd9a7cb633db_virlock

    • Size

      2.6MB

    • MD5

      a4f26a15f80707e2f143dd9a7cb633db

    • SHA1

      ff95de27eed7f36bbf4f19833fc5b96aaff95ae4

    • SHA256

      a7e6ed78900e0a42d1efd857936077c00da9395f377786a60d0eb36cf6194253

    • SHA512

      5bb13d8f05b48cda150eb8c62c1f9e3c851cdfdc7e51877822db26e14121c575a56e9664a0bc414bef2c6b2afb92671dcfa4ac23abbf730b7729955cf0851a92

    • SSDEEP

      49152:+AvymXkAuC7LcGfed9ygU8s8hwMQ//QmL1kvPv/:dymXkAXlfed9ygU8FQ/J8

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (81) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks