General

  • Target

    2024092080e72317721dd6d5a50e52da6cc2113cvirlock

  • Size

    326KB

  • Sample

    240920-w3q96a1djk

  • MD5

    80e72317721dd6d5a50e52da6cc2113c

  • SHA1

    3426df0c5e67a4cdb8973ade4d8530000808c49a

  • SHA256

    892c81979c510816baac1fb06806dfbb310976b7258d591e7a5c9ef5c730b4ef

  • SHA512

    c139f38d2ab2fba7a9757c9e2eaf5c25fc17a0484a7b4a36962dd5ad8d9fbc43c3a1a302572aefe1674e05e60f01633dab249317732b8e99fac47ec4fe4368e1

  • SSDEEP

    6144:zxcBFEGDfWhgerC8eenWJB129tOoxhVqFg+vEEzBiJDySBfa4K+N3z3obq2:zyEod6BoJB1I/4PETDyLR+N3zY+2

Malware Config

Targets

    • Target

      2024092080e72317721dd6d5a50e52da6cc2113cvirlock

    • Size

      326KB

    • MD5

      80e72317721dd6d5a50e52da6cc2113c

    • SHA1

      3426df0c5e67a4cdb8973ade4d8530000808c49a

    • SHA256

      892c81979c510816baac1fb06806dfbb310976b7258d591e7a5c9ef5c730b4ef

    • SHA512

      c139f38d2ab2fba7a9757c9e2eaf5c25fc17a0484a7b4a36962dd5ad8d9fbc43c3a1a302572aefe1674e05e60f01633dab249317732b8e99fac47ec4fe4368e1

    • SSDEEP

      6144:zxcBFEGDfWhgerC8eenWJB129tOoxhVqFg+vEEzBiJDySBfa4K+N3z3obq2:zyEod6BoJB1I/4PETDyLR+N3zY+2

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (58) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks