General

  • Target

    2024-09-20_382e2ff76a7d559cb6ee3ec0efdd5180_virlock

  • Size

    118KB

  • Sample

    240920-ldr52szajg

  • MD5

    382e2ff76a7d559cb6ee3ec0efdd5180

  • SHA1

    1386d87720186bd205696a1eb85c7929bea1971c

  • SHA256

    ca3cf7701c10514a28a5e84909ed6828efb4f55871f8557267358cd3276784f4

  • SHA512

    42bfbe7dce9dfe8701794adfeee05ab2fd79a435d9eee7fbf79b5b8b89c4df2ae8fd092e3022b586898508f1d9ef6bd7053c7e71512caea4b38edb07e764b858

  • SSDEEP

    1536:n3hfhDDawQ2grU+hVMlyO1anFekMrLDQvS29eSFRxn3dO9YaEXMEEOa+SL/8POuB:nHDRQ/g+hVMlj8snrQv5ZO6a+m/cq

Malware Config

Targets

    • Target

      2024-09-20_382e2ff76a7d559cb6ee3ec0efdd5180_virlock

    • Size

      118KB

    • MD5

      382e2ff76a7d559cb6ee3ec0efdd5180

    • SHA1

      1386d87720186bd205696a1eb85c7929bea1971c

    • SHA256

      ca3cf7701c10514a28a5e84909ed6828efb4f55871f8557267358cd3276784f4

    • SHA512

      42bfbe7dce9dfe8701794adfeee05ab2fd79a435d9eee7fbf79b5b8b89c4df2ae8fd092e3022b586898508f1d9ef6bd7053c7e71512caea4b38edb07e764b858

    • SSDEEP

      1536:n3hfhDDawQ2grU+hVMlyO1anFekMrLDQvS29eSFRxn3dO9YaEXMEEOa+SL/8POuB:nHDRQ/g+hVMlj8snrQv5ZO6a+m/cq

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (82) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks