General

  • Target

    20241002517ddf3d5bcc5a2f93a73c83b139a809virlock

  • Size

    115KB

  • Sample

    241002-vv2kgsxhjk

  • MD5

    517ddf3d5bcc5a2f93a73c83b139a809

  • SHA1

    48b2d67d43f4eef8c06b09a3cadc4c09649e82c4

  • SHA256

    2f7f525017be479779231054d51996b58363206874a42a445043f96f235ec8e5

  • SHA512

    dcdd2c3f5952558e1796bdf1924cdca406fd3c587e2e68aca4622adddecba179e3a605e5c1a69a72480e02bf1d157ae4d41c8de26938a95c59161a5372531a33

  • SSDEEP

    3072:80KMpRyYHZdyCzyX5xFn2fEBpTm6WC5me17quG:80KYxzYJb5me17qu

Malware Config

Targets

    • Target

      20241002517ddf3d5bcc5a2f93a73c83b139a809virlock

    • Size

      115KB

    • MD5

      517ddf3d5bcc5a2f93a73c83b139a809

    • SHA1

      48b2d67d43f4eef8c06b09a3cadc4c09649e82c4

    • SHA256

      2f7f525017be479779231054d51996b58363206874a42a445043f96f235ec8e5

    • SHA512

      dcdd2c3f5952558e1796bdf1924cdca406fd3c587e2e68aca4622adddecba179e3a605e5c1a69a72480e02bf1d157ae4d41c8de26938a95c59161a5372531a33

    • SSDEEP

      3072:80KMpRyYHZdyCzyX5xFn2fEBpTm6WC5me17quG:80KYxzYJb5me17qu

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (79) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks