General

  • Target

    20240920a15a2fb906ba42425a98b98c94e4f4advirlock

  • Size

    207KB

  • Sample

    240920-qynetazbmr

  • MD5

    a15a2fb906ba42425a98b98c94e4f4ad

  • SHA1

    ef86c496d4fbfa8cdb9a522826cdb14b1b4c420d

  • SHA256

    856b4970b7c9f02b05f3d0851aa19607ac9f3a20c3cd00602c27a90db7cf7403

  • SHA512

    4b061be8e56c8864fb245a12c4ebedea2156854dc197b5452e0725fa2abf1f61ef5cae5abe568ebe45ea8af6429daf312dbf7e87231fd67d7ee2033e3faadef3

  • SSDEEP

    6144:fbZ7dlHxWinSO54nNQlfC0QqRWQCqeXhn3X7c7XPbzwc9ZJu:TlHP540fbzfZJu

Malware Config

Targets

    • Target

      20240920a15a2fb906ba42425a98b98c94e4f4advirlock

    • Size

      207KB

    • MD5

      a15a2fb906ba42425a98b98c94e4f4ad

    • SHA1

      ef86c496d4fbfa8cdb9a522826cdb14b1b4c420d

    • SHA256

      856b4970b7c9f02b05f3d0851aa19607ac9f3a20c3cd00602c27a90db7cf7403

    • SHA512

      4b061be8e56c8864fb245a12c4ebedea2156854dc197b5452e0725fa2abf1f61ef5cae5abe568ebe45ea8af6429daf312dbf7e87231fd67d7ee2033e3faadef3

    • SSDEEP

      6144:fbZ7dlHxWinSO54nNQlfC0QqRWQCqeXhn3X7c7XPbzwc9ZJu:TlHP540fbzfZJu

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (53) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks