MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 36f9c0f35dead818894b727aeac1ab47da7c1f290e8fb284183027537bfa759f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



VirLock


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 36f9c0f35dead818894b727aeac1ab47da7c1f290e8fb284183027537bfa759f
SHA3-384 hash: adc26e97bae14fe64f1767cbc54ca3b67f8388cc04f239a22c44d4e1316c226414ce69f9c1d1afc3d5607b540c571521
SHA1 hash: 102d5db437a4b4a252f17331132a91bfb2d71881
MD5 hash: 18129c1a44fd3cc177fffc42d435d2c6
humanhash: minnesota-august-coffee-earth
File name:18129c1a_by_Libranalysis
Download: download sample
Signature VirLock
File size:1'331'200 bytes
First seen:2021-05-05 09:07:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b015d87810dee83a59ce4e4097512a09 (1 x VirLock)
ssdeep 24576:IHEmtn6/SW8NTLzLTHFJs6pxMdxVSrX5P/WOOGmDRJP50cwwzrITNGriCprJCNE4:IHEm96/SW8NTLzLTH5pxExUrX5XyGmzk
Threatray 124 similar samples on MalwareBazaar
TLSH C8550238DB81886FECE156711CCA92BC201885817797193FA877BA7F46B42B5E3DC41B
Reporter Libranalysis


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Creating a process from a recently created file
Creating a service
Launching a service
DNS request
Searching for the window
Sending an HTTP GET request
Creating a file in the Windows subdirectories
Creating a file in the %temp% directory
Running batch commands
Deleting a recently created file
Launching a process
Creating a process with a hidden window
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Enabling autorun
Brute forcing passwords of local accounts
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to automate explorer (e.g. start an application)
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Creates an undocumented autostart registry key
Delayed program exit found
Drops batch files with force delete cmd (self deletion)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Uses cmd line tools excessively to alter registry or file data
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 404792 Sample: 18129c1a_by_Libranalysis Startdate: 05/05/2021 Architecture: WINDOWS Score: 100 72 Antivirus / Scanner detection for submitted sample 2->72 74 Multi AV Scanner detection for submitted file 2->74 76 Machine Learning detection for sample 2->76 9 18129c1a_by_Libranalysis.exe 3 16 2->9         started        13 OagUAwMA.exe 4 2->13         started        15 svchost.exe 2->15         started        17 3 other processes 2->17 process3 dnsIp4 62 C:\Users\user\FkYgIgII\jmAcQsIU.exe, PE32 9->62 dropped 64 C:\ProgramData\rawkgwUk\OagUAwMA.exe, PE32 9->64 dropped 66 C:\ProgramData\jUQgUoYM\QQQAQgMs.exe, PE32 9->66 dropped 68 2 other files (1 malicious) 9->68 dropped 92 Creates an undocumented autostart registry key 9->92 94 Uses cmd line tools excessively to alter registry or file data 9->94 96 Drops batch files with force delete cmd (self deletion) 9->96 98 Tries to detect virtualization through RDTSC time measurements 9->98 20 jmAcQsIU.exe 20 9->20         started        23 QQQAQgMs.exe 15 9->23         started        25 cmd.exe 1 9->25         started        29 4 other processes 9->29 100 Antivirus detection for dropped file 13->100 102 Machine Learning detection for dropped file 13->102 104 Contains functionality to detect hardware virtualization (CPUID execution measurement) 13->104 106 Delayed program exit found 13->106 27 WerFault.exe 15->27         started        70 127.0.0.1 unknown unknown 17->70 file5 signatures6 process7 signatures8 80 Antivirus detection for dropped file 20->80 82 Machine Learning detection for dropped file 20->82 84 Contains functionality to detect hardware virtualization (CPUID execution measurement) 20->84 31 QQQAQgMs.exe 20->31         started        33 QQQAQgMs.exe 20->33         started        86 Contains functionality to automate explorer (e.g. start an application) 23->86 88 Tries to detect virtualization through RDTSC time measurements 23->88 90 Delayed program exit found 23->90 35 18129c1a_by_Libranalysis.exe 2 25->35         started        38 conhost.exe 25->38         started        40 conhost.exe 29->40         started        42 conhost.exe 29->42         started        44 conhost.exe 29->44         started        46 conhost.exe 29->46         started        process9 signatures10 48 WerFault.exe 31->48         started        78 Uses cmd line tools excessively to alter registry or file data 35->78 50 reg.exe 1 35->50         started        52 reg.exe 1 35->52         started        54 reg.exe 1 35->54         started        process11 process12 56 conhost.exe 50->56         started        58 conhost.exe 52->58         started        60 conhost.exe 54->60         started       
Threat name:
Win32.Ransomware.VirLock
Status:
Malicious
First seen:
2021-05-05 09:08:17 UTC
AV detection:
44 of 47 (93.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence ransomware spyware stealer trojan
Behaviour
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Checks whether UAC is enabled
Checks computer location settings
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Modifies extensions of user files
Modifies WinLogon for persistence
Modifies visibility of file extensions in Explorer
UAC bypass
Unpacked files
SH256 hash:
6ebb15b565c96c331e058072fac57a1cee4eace245ac9b0d93679d7430223504
MD5 hash:
b44b8cae8a7e376b8c38e1604457ce0a
SHA1 hash:
e1c3a2812dbaaec16eca532724f98e12a988a77e
SH256 hash:
36f9c0f35dead818894b727aeac1ab47da7c1f290e8fb284183027537bfa759f
MD5 hash:
18129c1a44fd3cc177fffc42d435d2c6
SHA1 hash:
102d5db437a4b4a252f17331132a91bfb2d71881
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments