General

  • Target

    2024-09-25_d7e4867e48104c23701a7e822ba9d6cc_virlock

  • Size

    635KB

  • Sample

    240925-2bkaes1dkm

  • MD5

    d7e4867e48104c23701a7e822ba9d6cc

  • SHA1

    67483f3a8bfdbf9a2f56a7ddf4b042ef9a58f4d9

  • SHA256

    612293f2eb5b2fe1ed763cca00ab52456cdadf674425549ae528209242716b42

  • SHA512

    ece65bbfd0bf19a79b21d9214175c4c5e7e630a81bdff12b8b6b563ddf9b6e9b27c9fd0ae66b9192ba5b5ba83c175c4b0fc9468a823b4f8eaa843910402213d8

  • SSDEEP

    12288:e57Kj0BqIpjxL5EHV2koBvlc+n1n03KYwkbfqeJQNUdqQ6yorc:e5moBzw2vN4KZay4QudqQ6y

Malware Config

Targets

    • Target

      2024-09-25_d7e4867e48104c23701a7e822ba9d6cc_virlock

    • Size

      635KB

    • MD5

      d7e4867e48104c23701a7e822ba9d6cc

    • SHA1

      67483f3a8bfdbf9a2f56a7ddf4b042ef9a58f4d9

    • SHA256

      612293f2eb5b2fe1ed763cca00ab52456cdadf674425549ae528209242716b42

    • SHA512

      ece65bbfd0bf19a79b21d9214175c4c5e7e630a81bdff12b8b6b563ddf9b6e9b27c9fd0ae66b9192ba5b5ba83c175c4b0fc9468a823b4f8eaa843910402213d8

    • SSDEEP

      12288:e57Kj0BqIpjxL5EHV2koBvlc+n1n03KYwkbfqeJQNUdqQ6yorc:e5moBzw2vN4KZay4QudqQ6y

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (74) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks