General

  • Target

    2024-09-21_cc9fab6002b381aa613d3baa9eae8013_virlock

  • Size

    254KB

  • Sample

    240921-bn6fbaycpn

  • MD5

    cc9fab6002b381aa613d3baa9eae8013

  • SHA1

    a446bcba4d2e4d53d97aeede8ca1683c3ddc2838

  • SHA256

    04510cbb3144f8afbd590503198cba4faa8c1aa0d45af1bee60c0ea036e5a03a

  • SHA512

    5e360025caf1548fdb3fa980b62577f3b55e108a68fc6475d9632024eb45b08cc099f3db128616774d9a1992a7814e0f2c36a090cfe54cb2e593e78333670078

  • SSDEEP

    6144:n2GfX+cYJCCK2A6ARC6iTW35wXPWYJiSG1:n76DKaApiTW3K/WYJz+

Malware Config

Targets

    • Target

      2024-09-21_cc9fab6002b381aa613d3baa9eae8013_virlock

    • Size

      254KB

    • MD5

      cc9fab6002b381aa613d3baa9eae8013

    • SHA1

      a446bcba4d2e4d53d97aeede8ca1683c3ddc2838

    • SHA256

      04510cbb3144f8afbd590503198cba4faa8c1aa0d45af1bee60c0ea036e5a03a

    • SHA512

      5e360025caf1548fdb3fa980b62577f3b55e108a68fc6475d9632024eb45b08cc099f3db128616774d9a1992a7814e0f2c36a090cfe54cb2e593e78333670078

    • SSDEEP

      6144:n2GfX+cYJCCK2A6ARC6iTW35wXPWYJiSG1:n76DKaApiTW3K/WYJz+

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (80) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks