General

  • Target

    2025-06-17_794057eeeeadcd58344e2903bc296c21_elex_virlock

  • Size

    190KB

  • Sample

    250617-mdjz4sywev

  • MD5

    794057eeeeadcd58344e2903bc296c21

  • SHA1

    2a4e094712bfbfc6cc21284888e30729a818c2c5

  • SHA256

    90ff170d85e08d33e549507b81c800f80ab623e7b48e7799b3e680278c977a54

  • SHA512

    f36ae5a3d5f4a6e5fb97762f85fc97bb1fe648c22402f7966e0e25fd4e2f26adddb98e9ab0958159908c8dbd7efd7a046529fda082379893678b0bfe0139c56b

  • SSDEEP

    3072:EQj1fXryS7q4m551YDL0jQ74p6LXuDspOzpuUrEckGPLyBes:dS407yh7+6ruDspONuU+sfs

Malware Config

Targets

    • Target

      2025-06-17_794057eeeeadcd58344e2903bc296c21_elex_virlock

    • Size

      190KB

    • MD5

      794057eeeeadcd58344e2903bc296c21

    • SHA1

      2a4e094712bfbfc6cc21284888e30729a818c2c5

    • SHA256

      90ff170d85e08d33e549507b81c800f80ab623e7b48e7799b3e680278c977a54

    • SHA512

      f36ae5a3d5f4a6e5fb97762f85fc97bb1fe648c22402f7966e0e25fd4e2f26adddb98e9ab0958159908c8dbd7efd7a046529fda082379893678b0bfe0139c56b

    • SSDEEP

      3072:EQj1fXryS7q4m551YDL0jQ74p6LXuDspOzpuUrEckGPLyBes:dS407yh7+6ruDspONuU+sfs

    • Modifies visibility of file extensions in Explorer

    • Renames multiple (90) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks