General

  • Target

    20240906a0c518c73d7823bbb70c54cbe7b4529cvirlock

  • Size

    121KB

  • Sample

    240906-vtlsmsyfmh

  • MD5

    a0c518c73d7823bbb70c54cbe7b4529c

  • SHA1

    bbe851d88eb4f17fe673b5c3406ce2cb764e620a

  • SHA256

    f53c2792c8d99f222a8a9fee526af13a006083f5686ed8d7a0c69e116fd01994

  • SHA512

    b9fbdf97bfc91b4a0d7b261494e9dacebcae82e679865fa76f7c3288af23f96a0853a37b1e52e47c86b96bb132a9c6167e57a15342ef018c88ddfd6c62aab070

  • SSDEEP

    3072:TWuvhlsaLXRL53v6AWMBi1IEIGfBv8QX05etc:PcabR9v6AWMBi1IEICd8QX0Ytc

Malware Config

Targets

    • Target

      20240906a0c518c73d7823bbb70c54cbe7b4529cvirlock

    • Size

      121KB

    • MD5

      a0c518c73d7823bbb70c54cbe7b4529c

    • SHA1

      bbe851d88eb4f17fe673b5c3406ce2cb764e620a

    • SHA256

      f53c2792c8d99f222a8a9fee526af13a006083f5686ed8d7a0c69e116fd01994

    • SHA512

      b9fbdf97bfc91b4a0d7b261494e9dacebcae82e679865fa76f7c3288af23f96a0853a37b1e52e47c86b96bb132a9c6167e57a15342ef018c88ddfd6c62aab070

    • SSDEEP

      3072:TWuvhlsaLXRL53v6AWMBi1IEIGfBv8QX05etc:PcabR9v6AWMBi1IEICd8QX0Ytc

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (75) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks