General

  • Target

    2024-09-15_992acdf0929feebbe5c52fa30784c31b_virlock

  • Size

    193KB

  • Sample

    240915-mq9raszbng

  • MD5

    992acdf0929feebbe5c52fa30784c31b

  • SHA1

    51550659bffb2295542149859942117e496fbef5

  • SHA256

    b23d5ea3da2bdd3b25e0e1ae3be9609977b4e201f37caedc765bc492db14a4a4

  • SHA512

    25cd575b2f2c28ec823f06af2efa4ccfdd69b1ef7f9eae778db9e97e4defd7878a3b46df4864eecab782cf2b31484ecdaed944dabffcd210cd415a847fc2b727

  • SSDEEP

    3072:6Sif3Lg3EdwteuvaOX0AaikfsBH2ApKRnnK8WZv0KO2Sdz41:6hE3yuvaa0zbm+tVWZv0vdN

Malware Config

Targets

    • Target

      2024-09-15_992acdf0929feebbe5c52fa30784c31b_virlock

    • Size

      193KB

    • MD5

      992acdf0929feebbe5c52fa30784c31b

    • SHA1

      51550659bffb2295542149859942117e496fbef5

    • SHA256

      b23d5ea3da2bdd3b25e0e1ae3be9609977b4e201f37caedc765bc492db14a4a4

    • SHA512

      25cd575b2f2c28ec823f06af2efa4ccfdd69b1ef7f9eae778db9e97e4defd7878a3b46df4864eecab782cf2b31484ecdaed944dabffcd210cd415a847fc2b727

    • SSDEEP

      3072:6Sif3Lg3EdwteuvaOX0AaikfsBH2ApKRnnK8WZv0KO2Sdz41:6hE3yuvaa0zbm+tVWZv0vdN

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (53) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks