General

  • Target

    2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock

  • Size

    194KB

  • Sample

    240918-y1m6tssakp

  • MD5

    dec5fb1994d3579b05ee221e5a0d5410

  • SHA1

    a61241d9f6162fd2ab9e2263267c7629d8327865

  • SHA256

    c4826c9f70993ccd192b0f66c30a1f37f579f88efa3b3c9ff719ddae69b07a10

  • SHA512

    b26d406a5eaa60392cf9f6ae6e2a85fbd3333c56a99f45274b221c802f8a7c6a4791d03f3cde6c47d2c34533bb72e713edb69a67d32cf75daa3e596b782236c1

  • SSDEEP

    3072:5W5IeUtoX7UK453E9/hgSlWFwZoK0x55yU5mqwfK:wWtoX7K532J+FwZJUgU5mF

Malware Config

Targets

    • Target

      2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock

    • Size

      194KB

    • MD5

      dec5fb1994d3579b05ee221e5a0d5410

    • SHA1

      a61241d9f6162fd2ab9e2263267c7629d8327865

    • SHA256

      c4826c9f70993ccd192b0f66c30a1f37f579f88efa3b3c9ff719ddae69b07a10

    • SHA512

      b26d406a5eaa60392cf9f6ae6e2a85fbd3333c56a99f45274b221c802f8a7c6a4791d03f3cde6c47d2c34533bb72e713edb69a67d32cf75daa3e596b782236c1

    • SSDEEP

      3072:5W5IeUtoX7UK453E9/hgSlWFwZoK0x55yU5mqwfK:wWtoX7K532J+FwZJUgU5mF

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (81) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks