General

  • Target

    2024-10-11_2527ad4631f9457f9d411c4095680de4_virlock

  • Size

    217KB

  • Sample

    241011-3phjes1akf

  • MD5

    2527ad4631f9457f9d411c4095680de4

  • SHA1

    479e6e35a7081124592cf17b5c0a5d219e0caa2d

  • SHA256

    ce203fea13b4ba15c7b875473be386df48b5d453d5fddfa4aa1c84411ebeeb64

  • SHA512

    3737d7fbaa059a97bfdf17d2bc2a099b88dc90a1481147e47adb76034bef0315027f8f7706063cf6490fb2b324c2cca7c370445a20eb3e849e939ae47df89520

  • SSDEEP

    6144:dgboopvTsKbK+DUbtY4eBXjMDHsNU5u8FJ:oZs5YsDMe5

Malware Config

Targets

    • Target

      2024-10-11_2527ad4631f9457f9d411c4095680de4_virlock

    • Size

      217KB

    • MD5

      2527ad4631f9457f9d411c4095680de4

    • SHA1

      479e6e35a7081124592cf17b5c0a5d219e0caa2d

    • SHA256

      ce203fea13b4ba15c7b875473be386df48b5d453d5fddfa4aa1c84411ebeeb64

    • SHA512

      3737d7fbaa059a97bfdf17d2bc2a099b88dc90a1481147e47adb76034bef0315027f8f7706063cf6490fb2b324c2cca7c370445a20eb3e849e939ae47df89520

    • SSDEEP

      6144:dgboopvTsKbK+DUbtY4eBXjMDHsNU5u8FJ:oZs5YsDMe5

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (57) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks