General

  • Target

    20240920ded4167c3af8b568ba55b1b4f1e4411cvirlock

  • Size

    594KB

  • Sample

    240920-w91r6s1eph

  • MD5

    ded4167c3af8b568ba55b1b4f1e4411c

  • SHA1

    a4775eb3fa1285bfc17127ec421a0b9739345194

  • SHA256

    e4bf0ada567b4b07493c487bdb2141a93bdc864938039d1312f7823a5c6d66c0

  • SHA512

    e0ec7c5af8949381e70e48e82bd9082f99363f976f3a054949b1af0d9b6da841082c9da7c61da1e95f214bd5610f2d92102dc41ef1941e0af55fb661881fdcb3

  • SSDEEP

    12288:yNYscz7ybajpHgG2gPU33mo9orabR55HlmsjN+S0zz+9wFt8j4NUX9+9HlA1A5OY:yNLczWo32N3mo9o/mhb4HNb

Malware Config

Targets

    • Target

      20240920ded4167c3af8b568ba55b1b4f1e4411cvirlock

    • Size

      594KB

    • MD5

      ded4167c3af8b568ba55b1b4f1e4411c

    • SHA1

      a4775eb3fa1285bfc17127ec421a0b9739345194

    • SHA256

      e4bf0ada567b4b07493c487bdb2141a93bdc864938039d1312f7823a5c6d66c0

    • SHA512

      e0ec7c5af8949381e70e48e82bd9082f99363f976f3a054949b1af0d9b6da841082c9da7c61da1e95f214bd5610f2d92102dc41ef1941e0af55fb661881fdcb3

    • SSDEEP

      12288:yNYscz7ybajpHgG2gPU33mo9orabR55HlmsjN+S0zz+9wFt8j4NUX9+9HlA1A5OY:yNLczWo32N3mo9o/mhb4HNb

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks