MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 62acc5d1f03cb597ee923beb74381aa435097f9df0eb0663ee66f6dd40dfaa24. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
VirLock
Vendor detections: 8
| SHA256 hash: | 62acc5d1f03cb597ee923beb74381aa435097f9df0eb0663ee66f6dd40dfaa24 |
|---|---|
| SHA3-384 hash: | 4d4289fe4383427639a47f4a3bb7e917ad3e9bafae37a4c2110b00ed9c7268b23c86a1d4913e5231badfc1b5a17736c7 |
| SHA1 hash: | 4b1c6f9e26547ce2bfcccf9cc13dfb59359a6da6 |
| MD5 hash: | f9ac1a1c199391a3df13b5864ee0f250 |
| humanhash: | don-hot-nuts-potato |
| File name: | 62acc5d1f03cb597ee923beb74381aa435097f9df0eb0663ee66f6dd40dfaa24.bin |
| Download: | download sample |
| Signature | VirLock |
| File size: | 827'392 bytes |
| First seen: | 2021-01-11 10:06:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 5f08f42a0159d03eed83fd6df2c762bd (1 x VirLock) |
| ssdeep | 24576:XlFAifxx0C4gHYt8oozClP/bg2M3v6Gq7hiZ/uFB:1hxBhTClP/bg2M3v6Gq7hiZ/uF |
| TLSH | 770501E6F5E53EE2EE493574357D842F9E3F8A6F2E890F314BB550850A46327C684832 |
| Reporter |
Intelligence
File Origin
# of uploads :
1
# of downloads :
143
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
62acc5d1f03cb597ee923beb74381aa435097f9df0eb0663ee66f6dd40dfaa24.bin
Verdict:
Malicious activity
Analysis date:
2021-01-11 10:09:31 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Creating a service
Launching a service
DNS request
Creating a file in the Windows subdirectories
Creating a file in the %temp% directory
Sending an HTTP GET request
Sending a UDP request
Running batch commands
Searching for the window
Deleting a recently created file
Launching a process
Creating a process with a hidden window
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Brute forcing passwords of local accounts
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad.spre.spyw
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Delayed program exit found
Drops executable to a common third party application directory
Infects executable files (exe, dll, sys, html)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Uses cmd line tools excessively to alter registry or file data
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.VirLock
Status:
Malicious
First seen:
2021-01-10 17:47:37 UTC
File Type:
PE (Exe)
AV detection:
40 of 46 (86.96%)
Threat level:
5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
10/10
Tags:
evasion persistence spyware trojan
Behaviour
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Adds Run key to start application
JavaScript code in executable
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Modifies visibility of file extensions in Explorer
UAC bypass
Unpacked files
SH256 hash:
62acc5d1f03cb597ee923beb74381aa435097f9df0eb0663ee66f6dd40dfaa24
MD5 hash:
f9ac1a1c199391a3df13b5864ee0f250
SHA1 hash:
4b1c6f9e26547ce2bfcccf9cc13dfb59359a6da6
SH256 hash:
72e16f066186d8f1e8ca9faf096ad1b3b856c6c3387772738a9f41aaee637f4e
MD5 hash:
1fb422a1cded624230d9763aafa1bf81
SHA1 hash:
c60c1b89a5d1e8a6ab85b4a0bc9b443eb3e99ac7
SH256 hash:
4f7d6d263252612dc61309e405ede2302ea353afabd02867016ec26f252de763
MD5 hash:
b1ed9ffe3a99987f3dabc35f8644a76c
SHA1 hash:
c561eab302ba3e2dfedca4b9684fb275f2659367
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
VirLock
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.