General

  • Target

    2024-10-01_34f758c0385251d451b929f9e58d4664_virlock

  • Size

    321KB

  • Sample

    241001-reg95axdka

  • MD5

    34f758c0385251d451b929f9e58d4664

  • SHA1

    4d262ff2f0ff8cef6ace9e9d4940663f7ffdaf03

  • SHA256

    e6def6730fc703450befba5a6c348eba1d88b81a6a222d925524cdfb73531a38

  • SHA512

    9a859ab7ff8685496f572bfd10a95793b3b0bc29971d345e008c733cc20ef774fb8c1291f1d56d7cc6f114c01896df499bf5bc008331e421a5b37d25d6eaeaa0

  • SSDEEP

    6144:/qmlWPKnFOOYdNUhfEpREsUrSZBzNWPiFdjk8oEXdf52flgMQSqEHa:/qoFzwNUhu7MiFHoEdYyI6

Malware Config

Targets

    • Target

      2024-10-01_34f758c0385251d451b929f9e58d4664_virlock

    • Size

      321KB

    • MD5

      34f758c0385251d451b929f9e58d4664

    • SHA1

      4d262ff2f0ff8cef6ace9e9d4940663f7ffdaf03

    • SHA256

      e6def6730fc703450befba5a6c348eba1d88b81a6a222d925524cdfb73531a38

    • SHA512

      9a859ab7ff8685496f572bfd10a95793b3b0bc29971d345e008c733cc20ef774fb8c1291f1d56d7cc6f114c01896df499bf5bc008331e421a5b37d25d6eaeaa0

    • SSDEEP

      6144:/qmlWPKnFOOYdNUhfEpREsUrSZBzNWPiFdjk8oEXdf52flgMQSqEHa:/qoFzwNUhu7MiFHoEdYyI6

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks