General

  • Target

    2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock

  • Size

    121KB

  • Sample

    241121-cvs91axeje

  • MD5

    0ca1478489d45ef50ea00cc65e30f283

  • SHA1

    ac3541c33fb0769655b4e3e475d4381b140ba37c

  • SHA256

    f4364fae133e48bde2659e5903e133371af5e97b3cc3f84a9671a79187a7d42e

  • SHA512

    fd88962164d83e0f23a49cdf54e914b7d613075a5289c94bafb5e5616b8ebcea048357281a6e37f4233d148295080915f01f66ab8a5b90f99d443b07f5292c0b

  • SSDEEP

    3072:uAoxPqClJjfiPW1z12uNe+HA/40UugLSckJwd:3oxPpdz12uNS4eaSckJwd

Malware Config

Targets

    • Target

      2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock

    • Size

      121KB

    • MD5

      0ca1478489d45ef50ea00cc65e30f283

    • SHA1

      ac3541c33fb0769655b4e3e475d4381b140ba37c

    • SHA256

      f4364fae133e48bde2659e5903e133371af5e97b3cc3f84a9671a79187a7d42e

    • SHA512

      fd88962164d83e0f23a49cdf54e914b7d613075a5289c94bafb5e5616b8ebcea048357281a6e37f4233d148295080915f01f66ab8a5b90f99d443b07f5292c0b

    • SSDEEP

      3072:uAoxPqClJjfiPW1z12uNe+HA/40UugLSckJwd:3oxPpdz12uNS4eaSckJwd

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (76) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks