General

  • Target

    2024-11-20_054d19fe7e24112905510d95c1132b65_virlock

  • Size

    141KB

  • Sample

    241120-ql79fsxgpl

  • MD5

    054d19fe7e24112905510d95c1132b65

  • SHA1

    b06b7c1854b7c9f0459a9bd5874851cb1a1fdb05

  • SHA256

    b91e984b72e7b7d7b1da16a10d038df4fd02528d72475199006e085d1c85b0cf

  • SHA512

    7ad8e077dfff7671998eb1ba02dc1426519fee4aaabaa0d3c67b4fdf61ae2bd7e6179a4e3c505d00339816514d0bf2ed0bdb41a19b4925ab860a5c9e7373eae7

  • SSDEEP

    3072:m3RrJWSTuxkxfU3Rm9kIpXVC2jr4dcx3Jz04amiE:0DTuxk2MkINVCOrIi5reE

Malware Config

Targets

    • Target

      2024-11-20_054d19fe7e24112905510d95c1132b65_virlock

    • Size

      141KB

    • MD5

      054d19fe7e24112905510d95c1132b65

    • SHA1

      b06b7c1854b7c9f0459a9bd5874851cb1a1fdb05

    • SHA256

      b91e984b72e7b7d7b1da16a10d038df4fd02528d72475199006e085d1c85b0cf

    • SHA512

      7ad8e077dfff7671998eb1ba02dc1426519fee4aaabaa0d3c67b4fdf61ae2bd7e6179a4e3c505d00339816514d0bf2ed0bdb41a19b4925ab860a5c9e7373eae7

    • SSDEEP

      3072:m3RrJWSTuxkxfU3Rm9kIpXVC2jr4dcx3Jz04amiE:0DTuxk2MkINVCOrIi5reE

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks