MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4cfb6842146846fca052d82cc0f80e23c3a7b23bd5958aecfa6a21e28825a1f0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LegionLocker


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 4cfb6842146846fca052d82cc0f80e23c3a7b23bd5958aecfa6a21e28825a1f0
SHA3-384 hash: d863f549d34e4218b0976bf1396c5dfb5186384f96ffe88d7677652e4bc0d04caa24f1781f9efe851ad91bfc2609c757
SHA1 hash: c099a07b701c1f06709e181481a5938f9b6e001a
MD5 hash: d48b80eadbbe9bfb68f3fbe11a6cf0e5
humanhash: hawaii-beer-snake-pip
File name:LegionLocker.exe
Download: download sample
Signature LegionLocker
File size:3'261'236 bytes
First seen:2021-03-26 18:26:59 UTC
Last seen:2021-03-26 20:31:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4328f7206db519cd4e82283211d98e83 (533 x RedLineStealer, 18 x Arechclient2, 15 x DCRat)
ssdeep 98304:RUqA6Sp+ZIogCxfwijqisUzS5Q1J6KtqxxwwpJKILMWv:NAOC/MINxxVpEpW
Threatray 2'093 similar samples on MalwareBazaar
TLSH F4E533634C246671DBBE623F4A6DE101A3506E0415E9B9D3F15EF0A06DB3DF28F62C98
Reporter Finch39487976
Tags:LegionLocker Ransomware

Intelligence


File Origin
# of uploads :
2
# of downloads :
344
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
LegionLocker.exe
Verdict:
Malicious activity
Analysis date:
2021-03-26 17:50:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for analyzing tools
Searching for the window
Sending a UDP request
Creating a window
Launching cmd.exe command interpreter
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Modifying an executable file
Changing a file
Reading critical registry keys
Launching a tool to kill processes
Forced shutdown of a system process
Stealing user critical data
Encrypting user's files
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Clay Ransomware
Verdict:
Malicious
Result
Threat name:
Cobra Locker
Detection:
malicious
Classification:
rans.evad
Score:
84 / 100
Signature
Detected unpacking (changes PE section rights)
Hides threads from debuggers
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Yara detected Cobra Locker ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 376616 Sample: LegionLocker.exe Startdate: 26/03/2021 Architecture: WINDOWS Score: 84 41 Yara detected Cobra Locker ransomware 2->41 43 Machine Learning detection for sample 2->43 45 PE file contains section with special chars 2->45 7 LegionLocker.exe 4 2->7         started        process3 file4 35 C:\Users\user\Desktop\DQOFHVHTMG.xlsx, data 7->35 dropped 37 C:\Users\user\Desktop\BUFZSQPCOH.jpg, data 7->37 dropped 39 C:\Users\user\Desktop\BQJUWOYRTO.png, data 7->39 dropped 47 Detected unpacking (changes PE section rights) 7->47 49 Query firmware table information (likely to detect VMs) 7->49 51 Tries to detect sandboxes and other dynamic analysis tools (window names) 7->51 53 3 other signatures 7->53 11 cmd.exe 1 7->11         started        13 cmd.exe 1 7->13         started        15 cmd.exe 1 7->15         started        17 16 other processes 7->17 signatures5 process6 process7 19 taskkill.exe 1 11->19         started        21 conhost.exe 11->21         started        23 conhost.exe 13->23         started        25 conhost.exe 15->25         started        27 conhost.exe 17->27         started        29 conhost.exe 17->29         started        31 conhost.exe 17->31         started        33 13 other processes 17->33
Threat name:
Win32.Ransomware.Encoder
Status:
Malicious
First seen:
2021-03-26 18:27:05 UTC
AV detection:
14 of 29 (48.28%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion ransomware themida trojan
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Drops desktop.ini file(s)
Checks BIOS information in registry
themida
Modifies extensions of user files
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Unpacked files
SH256 hash:
adf851e445f68f308fd69bd69d03aaaa2120226e18de5bf08069e23935e6ef47
MD5 hash:
3a3c5f541caefef510eebf82a4d9dc03
SHA1 hash:
84dfd351983c45a42b2fa7760fbd86d749d44854
SH256 hash:
c51747d7ab6241e39347ea2df8b69c6485e7cbd50ce1b703ba32d0367217a707
MD5 hash:
a36f2331916ea72b1ff0d3dd1c13de84
SHA1 hash:
801cfc7a29246a81ed93ba65baa1d4dfbe80d1a6
SH256 hash:
00dcdb2835fc611a56ad3cd541a2a9f55e35ed38a31a194ea383994cf13d397f
MD5 hash:
48f37951b1d33c2f7a7a095249863ef8
SHA1 hash:
7b0cbb4e1e79f9175e5da3596175673605c3c9e8
SH256 hash:
d44c45ee375a39e9dc52c3341e30deca5e2cc1e51b0effe2da608ca1238dd553
MD5 hash:
6313a9be947b77e0c6d445bdedff8370
SHA1 hash:
387016eedca31423d2f680d77ca87149f7cc8630
SH256 hash:
00b9c0120df0595184523a3620ef9b3c3e11fc0e61d366d7eeabb646647cfceb
MD5 hash:
bd1f243ee2140f2f6118a7754ea02a63
SHA1 hash:
cdf7dd7dd1771edcc473037af80afd7e449e30d9
SH256 hash:
e37aa72bca3cecb9bdbe51cbd81ec1143bb17163088a1379a4ccb93f5d881e76
MD5 hash:
5cac4fe734fc8454ccb847e030beee38
SHA1 hash:
34298fe220e35f614b2c837cf1dc2604ab0882d6
SH256 hash:
4cfb6842146846fca052d82cc0f80e23c3a7b23bd5958aecfa6a21e28825a1f0
MD5 hash:
d48b80eadbbe9bfb68f3fbe11a6cf0e5
SHA1 hash:
c099a07b701c1f06709e181481a5938f9b6e001a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments