General

  • Target

    2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock

  • Size

    742KB

  • Sample

    240920-n66v1sveph

  • MD5

    c2f2ce5f0660afce6129275ef6e8d5aa

  • SHA1

    2d7340dabae0b25c7c74d1e5fedb067c3b81bb35

  • SHA256

    3ca3cf4fd5903f075c9d524a4cf3cb07e3cb4d04200c887bb7fd8ebd2fd94a6c

  • SHA512

    031d53cfab712c2ca31f7c0575048773c9c2760eee13ae944561ef6a3c0fc75742c8cec727c02983bd73c41802eba860410130d918b7850be4f01f7f517e4888

  • SSDEEP

    12288:8jgpOimob/2G4R+/H+l9gAlKOyNU10IW2ZZe9hQbJB+BR2x4fl7ttiLU7xKn:+gpP/29+fI6zOyNU10IWwQ9h8BNx4t72

Malware Config

Targets

    • Target

      2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock

    • Size

      742KB

    • MD5

      c2f2ce5f0660afce6129275ef6e8d5aa

    • SHA1

      2d7340dabae0b25c7c74d1e5fedb067c3b81bb35

    • SHA256

      3ca3cf4fd5903f075c9d524a4cf3cb07e3cb4d04200c887bb7fd8ebd2fd94a6c

    • SHA512

      031d53cfab712c2ca31f7c0575048773c9c2760eee13ae944561ef6a3c0fc75742c8cec727c02983bd73c41802eba860410130d918b7850be4f01f7f517e4888

    • SSDEEP

      12288:8jgpOimob/2G4R+/H+l9gAlKOyNU10IW2ZZe9hQbJB+BR2x4fl7ttiLU7xKn:+gpP/29+fI6zOyNU10IWwQ9h8BNx4t72

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (54) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks