MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



KiraLock


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024
SHA3-384 hash: da6e006286f89e398efacf9dc2fe1b6340fd51c9b2afef647d4940455b6884481027a925443ec6f2fed3986dee6f4778
SHA1 hash: be71b94e30d5465d8b72e1fc7c0137024f97baee
MD5 hash: 055c2fba242d03ae153be4a796c55ae2
humanhash: berlin-two-table-jersey
File name:4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024
Download: download sample
Signature KiraLock
File size:433'152 bytes
First seen:2020-05-14 14:47:22 UTC
Last seen:2020-05-14 15:50:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 3072:AuY/YunIL8Erv6r2btK6jmmUqEaEq5ipsvl7asLVGaSH:JsYHCr2bgSmMipsvVV
Threatray 19 similar samples on MalwareBazaar
TLSH 429412F6DD458542D2303673EFA1B7328F298FD8B1A22005E61ABA567035F9EC92DC53
Reporter Anonymous
Tags:KiraLock


Avatar
Anonymous
KiraLock "large" variant

Intelligence


File Origin
# of uploads :
2
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Hakbit
Status:
Malicious
First seen:
2020-05-11 16:07:43 UTC
File Type:
PE (.Net Exe)
Extracted files:
17
AV detection:
24 of 31 (77.42%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:hakbit evasion persistence ransomware spyware
Behaviour
Interacts with shadow copies
Kills process with taskkill
Opens file in notepad (likely ransom note)
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Launches sc.exe
Modifies service
Enumerates connected drives
Modifies WinLogon
Deletes itself
Reads user/profile data of web browsers
Disables Task Manager via registry modification
Modifies extensions of user files
Deletes shadow copies
Hakbit
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments