General

  • Target

    20240920006fbb7a7a5386fe5629f895d8969b45virlock

  • Size

    208KB

  • Sample

    240920-wxb82s1alj

  • MD5

    006fbb7a7a5386fe5629f895d8969b45

  • SHA1

    0241c9d8234e6b31d51f70a9df97dfa700a73229

  • SHA256

    7f89c34f98ce21ea18234c4e5c0fb83274cd63519b630d553bb6751b0b6fe4e2

  • SHA512

    995542437cca9f18a56a9a51fa69a01da784d7d8be277ab2e6be83fd2d162ab3761992aaaacb93e337de4a70aabbcee0e4068dd5632cf98b9534fd836340cb84

  • SSDEEP

    3072:FRyqCshdxLZhd91BNskwIBnvy8VLKYl0XMKvWWFDTJOQd2xfPmS:HFHfdbsJIBnhVLKYlQRFDt5d4

Malware Config

Targets

    • Target

      20240920006fbb7a7a5386fe5629f895d8969b45virlock

    • Size

      208KB

    • MD5

      006fbb7a7a5386fe5629f895d8969b45

    • SHA1

      0241c9d8234e6b31d51f70a9df97dfa700a73229

    • SHA256

      7f89c34f98ce21ea18234c4e5c0fb83274cd63519b630d553bb6751b0b6fe4e2

    • SHA512

      995542437cca9f18a56a9a51fa69a01da784d7d8be277ab2e6be83fd2d162ab3761992aaaacb93e337de4a70aabbcee0e4068dd5632cf98b9534fd836340cb84

    • SSDEEP

      3072:FRyqCshdxLZhd91BNskwIBnvy8VLKYl0XMKvWWFDTJOQd2xfPmS:HFHfdbsJIBnhVLKYlQRFDt5d4

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (57) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks