General

  • Target

    2025-02-18_e1b0e895123a10cde21436bbbe2de44d_virlock

  • Size

    319KB

  • Sample

    250218-jwpfrszpx4

  • MD5

    e1b0e895123a10cde21436bbbe2de44d

  • SHA1

    b124ebd9fb348752436fc0caaa32bc7704a568de

  • SHA256

    61f43c1c12dbf3ef739f754d8cad62aff85bd4ab664288c7e8332eabb56ecd67

  • SHA512

    22fca8e5ad966e0b9bbcd5c2d01eed4254d00974d0b6f565436fa0344a8f081d85ecce355290af88bbe45ec7b8119b1e901ab3a504738aba2c645d3150ab6a7e

  • SSDEEP

    6144:kXxkV4VYwm2FadD8Nf83myn1sSc9IbobptIDOUpxUjxigh7:kXxkV4V94dD8Nf81A9IbuI62O7

Malware Config

Targets

    • Target

      2025-02-18_e1b0e895123a10cde21436bbbe2de44d_virlock

    • Size

      319KB

    • MD5

      e1b0e895123a10cde21436bbbe2de44d

    • SHA1

      b124ebd9fb348752436fc0caaa32bc7704a568de

    • SHA256

      61f43c1c12dbf3ef739f754d8cad62aff85bd4ab664288c7e8332eabb56ecd67

    • SHA512

      22fca8e5ad966e0b9bbcd5c2d01eed4254d00974d0b6f565436fa0344a8f081d85ecce355290af88bbe45ec7b8119b1e901ab3a504738aba2c645d3150ab6a7e

    • SSDEEP

      6144:kXxkV4VYwm2FadD8Nf83myn1sSc9IbobptIDOUpxUjxigh7:kXxkV4V94dD8Nf81A9IbuI62O7

    • Modifies visibility of file extensions in Explorer

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks