General

  • Target

    2024-11-21_86d4ff1c8fcc0ccb4bc6e0d00bd1296a_virlock

  • Size

    563KB

  • Sample

    241121-sv7emaxpbl

  • MD5

    86d4ff1c8fcc0ccb4bc6e0d00bd1296a

  • SHA1

    dd6d0980ba99e9a4b829cdd9be079e8c27ef1d5c

  • SHA256

    d4ddd2a2f2442367468e14975eec5ea6384216178a83041b95a204485a53dd3e

  • SHA512

    e922051162c98c8931c17973a7db7bb5b23c797032445bc37f30605f7c328d37103242cbcde13352c86747a7358d505700ee4770d904b0314972e4d3511cf3a9

  • SSDEEP

    12288:TQ27tiqU7msOi34w8Scsqqvv3IegIeE0VqMq9y/d0k1f0RgJ:TQKit7aqcScsqyIegIe3UMOxA0Rg

Malware Config

Targets

    • Target

      2024-11-21_86d4ff1c8fcc0ccb4bc6e0d00bd1296a_virlock

    • Size

      563KB

    • MD5

      86d4ff1c8fcc0ccb4bc6e0d00bd1296a

    • SHA1

      dd6d0980ba99e9a4b829cdd9be079e8c27ef1d5c

    • SHA256

      d4ddd2a2f2442367468e14975eec5ea6384216178a83041b95a204485a53dd3e

    • SHA512

      e922051162c98c8931c17973a7db7bb5b23c797032445bc37f30605f7c328d37103242cbcde13352c86747a7358d505700ee4770d904b0314972e4d3511cf3a9

    • SSDEEP

      12288:TQ27tiqU7msOi34w8Scsqqvv3IegIeE0VqMq9y/d0k1f0RgJ:TQKit7aqcScsqyIegIe3UMOxA0Rg

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks