General

  • Target

    2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock

  • Size

    203KB

  • Sample

    240913-t5zm7sxflh

  • MD5

    bb58b8f9026bd66985f7ea212561022a

  • SHA1

    c15422826787e085d0d7b3fcfd1d7f0adb68143d

  • SHA256

    29b205cd7255ed3a9a1078bd396dafe33966ebe5a289881a7f169eabd76ac5ed

  • SHA512

    c4ce24fd55664934f09354e822b9051f90fa84079da30185142b5469d711d1af244b0cf4bc2689f801c9c38da2a88dcabc8d85044f5a1bc30df9044bebfe4d67

  • SSDEEP

    6144:ccevyodMBtHBEPLW7VinSBth+3mJLi9FM9QU2hwnkptBhmiX:cLeBtHBEPLW7VinSBth+3cLi9XU2h2i7

Malware Config

Targets

    • Target

      2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock

    • Size

      203KB

    • MD5

      bb58b8f9026bd66985f7ea212561022a

    • SHA1

      c15422826787e085d0d7b3fcfd1d7f0adb68143d

    • SHA256

      29b205cd7255ed3a9a1078bd396dafe33966ebe5a289881a7f169eabd76ac5ed

    • SHA512

      c4ce24fd55664934f09354e822b9051f90fa84079da30185142b5469d711d1af244b0cf4bc2689f801c9c38da2a88dcabc8d85044f5a1bc30df9044bebfe4d67

    • SSDEEP

      6144:ccevyodMBtHBEPLW7VinSBth+3mJLi9FM9QU2hwnkptBhmiX:cLeBtHBEPLW7VinSBth+3cLi9XU2h2i7

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (54) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks