General

  • Target

    2024-10-12_8666080110dcfb8e2ffc68637f07c450_virlock

  • Size

    254KB

  • Sample

    241012-bsqwesvdqg

  • MD5

    8666080110dcfb8e2ffc68637f07c450

  • SHA1

    81c37b3e435a7dd9b51b452234d41e5dfd45ea5f

  • SHA256

    b3ad8980b67477c6beba94d6bfd2762fa84849a4b8c975b320df52174a546705

  • SHA512

    098805dbc250c25df034b1bed1329e1a5475f63dc689f2d1ec1ab997ebe13597ec8a7641f343166c0919e3168df22106d7ec74ba9856b1a93c7d8177852fdb3a

  • SSDEEP

    3072:Kbtsgw7uX3SGgkf8L/fj3s12OOV19CpMNhK8xjKcA4ft6VetL8dRbUz4QqJS8VX1:Pg9Vgkf8L/fj3c6VSNUjHA/CYCal

Malware Config

Targets

    • Target

      2024-10-12_8666080110dcfb8e2ffc68637f07c450_virlock

    • Size

      254KB

    • MD5

      8666080110dcfb8e2ffc68637f07c450

    • SHA1

      81c37b3e435a7dd9b51b452234d41e5dfd45ea5f

    • SHA256

      b3ad8980b67477c6beba94d6bfd2762fa84849a4b8c975b320df52174a546705

    • SHA512

      098805dbc250c25df034b1bed1329e1a5475f63dc689f2d1ec1ab997ebe13597ec8a7641f343166c0919e3168df22106d7ec74ba9856b1a93c7d8177852fdb3a

    • SSDEEP

      3072:Kbtsgw7uX3SGgkf8L/fj3s12OOV19CpMNhK8xjKcA4ft6VetL8dRbUz4QqJS8VX1:Pg9Vgkf8L/fj3c6VSNUjHA/CYCal

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (85) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks