General

  • Target

    2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock

  • Size

    241KB

  • Sample

    241121-dezyaayjdt

  • MD5

    5c96825d8cd6c41c6d564ffdf7d1675b

  • SHA1

    ed2f9aaa37356cbf0fdb1370d8d580f12e487960

  • SHA256

    6cf802b773edcd7a7da9dcdeeb36fb2b3209bb616d29010fe90153b0595e2ec4

  • SHA512

    6b2b5187aff8a90a9f48924bb40cc660e1b1207def30e5902172a883fdb49ed0b08e180bd4d239752190c1f7af010c2c6eb6afe417768b46c481424fe5771a26

  • SSDEEP

    6144:sh6vAzJiHk5fTX2pGdq2EqkBTnY4zNDfLGrsOiFo/kYRd:sVkH2Da72SK4ZLK/6Kd

Malware Config

Targets

    • Target

      2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock

    • Size

      241KB

    • MD5

      5c96825d8cd6c41c6d564ffdf7d1675b

    • SHA1

      ed2f9aaa37356cbf0fdb1370d8d580f12e487960

    • SHA256

      6cf802b773edcd7a7da9dcdeeb36fb2b3209bb616d29010fe90153b0595e2ec4

    • SHA512

      6b2b5187aff8a90a9f48924bb40cc660e1b1207def30e5902172a883fdb49ed0b08e180bd4d239752190c1f7af010c2c6eb6afe417768b46c481424fe5771a26

    • SSDEEP

      6144:sh6vAzJiHk5fTX2pGdq2EqkBTnY4zNDfLGrsOiFo/kYRd:sVkH2Da72SK4ZLK/6Kd

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks