General

  • Target

    2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock

  • Size

    200KB

  • Sample

    240907-nm4xbasbjr

  • MD5

    afaa6a14eb7b46dc2165b3654e238b1a

  • SHA1

    de9344d62cbe3bb743605e5b08ef2f0f53105a24

  • SHA256

    cb4bd47c9b59bf3955ea560705f748457e4656d8d07c68744e177a487f25a6b8

  • SHA512

    8439927311549274249f631eea79f4daa7d4334d3f300cd6d0b4810c7528fa3adbab1d3f6bd6fdb0efba64321a43eedba1453d5ef9dab6fa83724a28675a695e

  • SSDEEP

    3072:jR3295cHoQmi9B6m38FER2L0GC9gA5n3xGFVDGQ9U8XcURE5gwfxG9FDtN:dG5omVmM8cA5nBGF9U8XcUREHfxGH

Malware Config

Targets

    • Target

      2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock

    • Size

      200KB

    • MD5

      afaa6a14eb7b46dc2165b3654e238b1a

    • SHA1

      de9344d62cbe3bb743605e5b08ef2f0f53105a24

    • SHA256

      cb4bd47c9b59bf3955ea560705f748457e4656d8d07c68744e177a487f25a6b8

    • SHA512

      8439927311549274249f631eea79f4daa7d4334d3f300cd6d0b4810c7528fa3adbab1d3f6bd6fdb0efba64321a43eedba1453d5ef9dab6fa83724a28675a695e

    • SSDEEP

      3072:jR3295cHoQmi9B6m38FER2L0GC9gA5n3xGFVDGQ9U8XcURE5gwfxG9FDtN:dG5omVmM8cA5nBGF9U8XcUREHfxGH

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (53) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks