General

  • Target

    2024-11-20_18659347d30efa50b9d016ee840cf93e_virlock

  • Size

    786KB

  • Sample

    241120-19xgzavkgx

  • MD5

    18659347d30efa50b9d016ee840cf93e

  • SHA1

    39cca935296da1a8ea9ee6212ddb3e124bb2bc63

  • SHA256

    441def79f36e1d59d23e2809d1fd1003542e08d076c9433b1154f66778e549cc

  • SHA512

    c76bf1407d99617229c0d46b039b46e0be9090d18be46485c990712244594d0ef12ddbfd533ac73d118f247475aa54ee189545737d510e508dd1cc1a9b985357

  • SSDEEP

    12288:MiAg9D4dRlBMKbFJGy7H9dUx6/+AfteP096AryKrm7nTKRjjTTY4xIEZE:Mi99D4dRbUyzxjlFr8TK1U4xIEG

Malware Config

Targets

    • Target

      2024-11-20_18659347d30efa50b9d016ee840cf93e_virlock

    • Size

      786KB

    • MD5

      18659347d30efa50b9d016ee840cf93e

    • SHA1

      39cca935296da1a8ea9ee6212ddb3e124bb2bc63

    • SHA256

      441def79f36e1d59d23e2809d1fd1003542e08d076c9433b1154f66778e549cc

    • SHA512

      c76bf1407d99617229c0d46b039b46e0be9090d18be46485c990712244594d0ef12ddbfd533ac73d118f247475aa54ee189545737d510e508dd1cc1a9b985357

    • SSDEEP

      12288:MiAg9D4dRlBMKbFJGy7H9dUx6/+AfteP096AryKrm7nTKRjjTTY4xIEZE:Mi99D4dRbUyzxjlFr8TK1U4xIEG

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (63) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks