General

  • Target

    20240904d7aacaf33dbe0401327d7e2e26113c8cvirlock

  • Size

    116KB

  • Sample

    240904-ql6evs1amj

  • MD5

    d7aacaf33dbe0401327d7e2e26113c8c

  • SHA1

    69f72c1c04cfdb5a066fc51abdc7ff67b7f7a168

  • SHA256

    685f55c0a60b5bc67acd991da4fc82bac90b4d853f37ab32c1e1d540e244c9e6

  • SHA512

    913c4f95367521078e65123dca60232a900a03d66e94343cd62578628378b2a16b59aabe23816018e81d5510a52c646ddcc7f87ecb918ff9c995b0017b181c15

  • SSDEEP

    1536:mJ7RNoU6UOv2RK26Rght/K/VTmWU8YGUYgsWhs9mgs9twaIt9grJu5JEGI6nPymV:ANNoQKxQE1mWUsgsHPgri/n6m

Malware Config

Targets

    • Target

      20240904d7aacaf33dbe0401327d7e2e26113c8cvirlock

    • Size

      116KB

    • MD5

      d7aacaf33dbe0401327d7e2e26113c8c

    • SHA1

      69f72c1c04cfdb5a066fc51abdc7ff67b7f7a168

    • SHA256

      685f55c0a60b5bc67acd991da4fc82bac90b4d853f37ab32c1e1d540e244c9e6

    • SHA512

      913c4f95367521078e65123dca60232a900a03d66e94343cd62578628378b2a16b59aabe23816018e81d5510a52c646ddcc7f87ecb918ff9c995b0017b181c15

    • SSDEEP

      1536:mJ7RNoU6UOv2RK26Rght/K/VTmWU8YGUYgsWhs9mgs9twaIt9grJu5JEGI6nPymV:ANNoQKxQE1mWUsgsHPgri/n6m

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (82) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks