General

  • Target

    2024-09-02_f609863994b265254bfe25e03cb1ddbf_virlock

  • Size

    567KB

  • Sample

    240902-lwz9daydmg

  • MD5

    f609863994b265254bfe25e03cb1ddbf

  • SHA1

    c6a28057862f9d7d96a15b9d147c55780069a5c6

  • SHA256

    93a8ca2854c44581db03b0d28e30348ed6c9a60bb31fdffcaa374424c0e6bcaa

  • SHA512

    ff784a4b730342311702f9a9d2680a4938a9cf4ef97ab6cbf915e5aaddf0c9a6ea455aa4954800fbeb3d32240d36c879f4e71e743c499c1769a8d66c1a9b9deb

  • SSDEEP

    12288:ppHP4YeP6v5i0CfjTLVvHIeGpu1bV8ameuiMCXJr/+jh/jqW8ARnrAuOOhBBfpaO:ppvQy5CfjXOkJ5T8h/jp8ARnrlZ

Malware Config

Targets

    • Target

      2024-09-02_f609863994b265254bfe25e03cb1ddbf_virlock

    • Size

      567KB

    • MD5

      f609863994b265254bfe25e03cb1ddbf

    • SHA1

      c6a28057862f9d7d96a15b9d147c55780069a5c6

    • SHA256

      93a8ca2854c44581db03b0d28e30348ed6c9a60bb31fdffcaa374424c0e6bcaa

    • SHA512

      ff784a4b730342311702f9a9d2680a4938a9cf4ef97ab6cbf915e5aaddf0c9a6ea455aa4954800fbeb3d32240d36c879f4e71e743c499c1769a8d66c1a9b9deb

    • SSDEEP

      12288:ppHP4YeP6v5i0CfjTLVvHIeGpu1bV8ameuiMCXJr/+jh/jqW8ARnrAuOOhBBfpaO:ppvQy5CfjXOkJ5T8h/jp8ARnrlZ

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks