General

  • Target

    202409207dd592ebe4f3611ab93c1899b4c843aavirlock

  • Size

    188KB

  • Sample

    240920-w3ax6s1aqe

  • MD5

    7dd592ebe4f3611ab93c1899b4c843aa

  • SHA1

    936bf145545be8fe5f771b2fc725e5da0300f23c

  • SHA256

    657ce51795124eab3cb86c4a2668cbcb60529c505109e139aba577449189b2bd

  • SHA512

    3a76bc98ccbda115241723a43425cd68d05cd405636981a35dd028dd2edb4671f4d6b7d224daa7807fcb8aa73319075864d41490132ec4d5e105ec7268e4f696

  • SSDEEP

    3072:b/MwLW/+k9e5kmQqtyBqNeaAo0gkG5g0l9txamlIazQsXIHuw:b/FrOji04ng0e4JzQsVw

Malware Config

Targets

    • Target

      202409207dd592ebe4f3611ab93c1899b4c843aavirlock

    • Size

      188KB

    • MD5

      7dd592ebe4f3611ab93c1899b4c843aa

    • SHA1

      936bf145545be8fe5f771b2fc725e5da0300f23c

    • SHA256

      657ce51795124eab3cb86c4a2668cbcb60529c505109e139aba577449189b2bd

    • SHA512

      3a76bc98ccbda115241723a43425cd68d05cd405636981a35dd028dd2edb4671f4d6b7d224daa7807fcb8aa73319075864d41490132ec4d5e105ec7268e4f696

    • SSDEEP

      3072:b/MwLW/+k9e5kmQqtyBqNeaAo0gkG5g0l9txamlIazQsXIHuw:b/FrOji04ng0e4JzQsVw

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks