General

  • Target

    2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock

  • Size

    143KB

  • Sample

    240907-xfe42syenp

  • MD5

    9b2c74478464af11cc7a8d075183837e

  • SHA1

    32bee1800b816bf16ff597a725bce001baefea8f

  • SHA256

    877c37e2b15ac450c67c4d88964ee53357e0722b03a046c603f626d3f39e80a4

  • SHA512

    832ff64c2c69ac6bf94beee2b7695e8e1cf671815be47921d2cd2e48652f1d912665da6110ef0258f3e1dc01bdc04e204cf8f05052541fbad91aa25c783a8780

  • SSDEEP

    3072:tfXPFEhlwj1pKzASHRPGq5yIq7Hxr+r6d+39fx:JXt6wj1pKzASx+YyIq7RS9

Malware Config

Targets

    • Target

      2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock

    • Size

      143KB

    • MD5

      9b2c74478464af11cc7a8d075183837e

    • SHA1

      32bee1800b816bf16ff597a725bce001baefea8f

    • SHA256

      877c37e2b15ac450c67c4d88964ee53357e0722b03a046c603f626d3f39e80a4

    • SHA512

      832ff64c2c69ac6bf94beee2b7695e8e1cf671815be47921d2cd2e48652f1d912665da6110ef0258f3e1dc01bdc04e204cf8f05052541fbad91aa25c783a8780

    • SSDEEP

      3072:tfXPFEhlwj1pKzASHRPGq5yIq7Hxr+r6d+39fx:JXt6wj1pKzASx+YyIq7RS9

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (56) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks