General

  • Target

    2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock

  • Size

    882KB

  • Sample

    241122-cd1mraxqgl

  • MD5

    784d6132ccc958a3e44ac9b8f26b64e1

  • SHA1

    3db2b316b3bf5bf9cc5c69e90f013f34ed283d34

  • SHA256

    efc7a45fe8efcbc92a1f16bfc3cfd1666fda5340815322af7cbee709c51d7cdc

  • SHA512

    5a5ca6f606c3dda9751766cfe799f3f35bf0337494bd21843e6df70588cca0d37014431338c3ed8652fbce4898980db59c063c89f3aa6c89e3a255d7eca5eb6a

  • SSDEEP

    24576:H694Zofqlkfx+cvhGHv9aTCJxlCEbrjUfyiXbfHG:H7qCgxHm9aUj8yizH

Malware Config

Targets

    • Target

      2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock

    • Size

      882KB

    • MD5

      784d6132ccc958a3e44ac9b8f26b64e1

    • SHA1

      3db2b316b3bf5bf9cc5c69e90f013f34ed283d34

    • SHA256

      efc7a45fe8efcbc92a1f16bfc3cfd1666fda5340815322af7cbee709c51d7cdc

    • SHA512

      5a5ca6f606c3dda9751766cfe799f3f35bf0337494bd21843e6df70588cca0d37014431338c3ed8652fbce4898980db59c063c89f3aa6c89e3a255d7eca5eb6a

    • SSDEEP

      24576:H694Zofqlkfx+cvhGHv9aTCJxlCEbrjUfyiXbfHG:H7qCgxHm9aUj8yizH

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (82) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks