General

  • Target

    2024-11-22_7f48053d5803d3f322fad89f4236f4d1_virlock

  • Size

    345KB

  • Sample

    241122-w4b7ma1qgk

  • MD5

    7f48053d5803d3f322fad89f4236f4d1

  • SHA1

    13bd674775d20adb50a74a5e2fdfe35d06e79829

  • SHA256

    d41120310abc5460dd0c09467f02069e03e9a8f47dfe1e59afd66e2ac804b219

  • SHA512

    c45e428f1eddaf912dbf934e7b0956f3907b0a4e1da75bb8a8e7a6226861978e54144b4f53983beb8b5865ebe5c495b04da48fe4bfc3f2b281338f30dc3112a0

  • SSDEEP

    3072:zaGPWZgjAtugamDGLh443IfjdoSXtoifnAGqTvVeSsWUHKjal:86Et7aQqUjdoSXtjfDdHKM

Malware Config

Targets

    • Target

      2024-11-22_7f48053d5803d3f322fad89f4236f4d1_virlock

    • Size

      345KB

    • MD5

      7f48053d5803d3f322fad89f4236f4d1

    • SHA1

      13bd674775d20adb50a74a5e2fdfe35d06e79829

    • SHA256

      d41120310abc5460dd0c09467f02069e03e9a8f47dfe1e59afd66e2ac804b219

    • SHA512

      c45e428f1eddaf912dbf934e7b0956f3907b0a4e1da75bb8a8e7a6226861978e54144b4f53983beb8b5865ebe5c495b04da48fe4bfc3f2b281338f30dc3112a0

    • SSDEEP

      3072:zaGPWZgjAtugamDGLh443IfjdoSXtoifnAGqTvVeSsWUHKjal:86Et7aQqUjdoSXtjfDdHKM

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (79) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks