MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 62acc5d1f03cb597ee923beb74381aa435097f9df0eb0663ee66f6dd40dfaa24. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



VirLock


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 62acc5d1f03cb597ee923beb74381aa435097f9df0eb0663ee66f6dd40dfaa24
SHA3-384 hash: 4d4289fe4383427639a47f4a3bb7e917ad3e9bafae37a4c2110b00ed9c7268b23c86a1d4913e5231badfc1b5a17736c7
SHA1 hash: 4b1c6f9e26547ce2bfcccf9cc13dfb59359a6da6
MD5 hash: f9ac1a1c199391a3df13b5864ee0f250
humanhash: don-hot-nuts-potato
File name:62acc5d1f03cb597ee923beb74381aa435097f9df0eb0663ee66f6dd40dfaa24.bin
Download: download sample
Signature VirLock
File size:827'392 bytes
First seen:2021-01-11 10:06:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5f08f42a0159d03eed83fd6df2c762bd (1 x VirLock)
ssdeep 24576:XlFAifxx0C4gHYt8oozClP/bg2M3v6Gq7hiZ/uFB:1hxBhTClP/bg2M3v6Gq7hiZ/uF
TLSH 770501E6F5E53EE2EE493574357D842F9E3F8A6F2E890F314BB550850A46327C684832
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
1
# of downloads :
143
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
62acc5d1f03cb597ee923beb74381aa435097f9df0eb0663ee66f6dd40dfaa24.bin
Verdict:
Malicious activity
Analysis date:
2021-01-11 10:09:31 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Creating a service
Launching a service
DNS request
Creating a file in the Windows subdirectories
Creating a file in the %temp% directory
Sending an HTTP GET request
Sending a UDP request
Running batch commands
Searching for the window
Deleting a recently created file
Launching a process
Creating a process with a hidden window
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Brute forcing passwords of local accounts
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad.spre.spyw
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Delayed program exit found
Drops executable to a common third party application directory
Infects executable files (exe, dll, sys, html)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Uses cmd line tools excessively to alter registry or file data
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 337960 Sample: iDhegzazur.exe Startdate: 11/01/2021 Architecture: WINDOWS Score: 100 69 Antivirus detection for dropped file 2->69 71 Antivirus / Scanner detection for submitted sample 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 3 other signatures 2->75 8 iDhegzazur.exe 2 12 2->8         started        12 duUUkYQk.exe 22 2->12         started        14 kcwoAYwM.exe 3 2->14         started        16 11 other processes 2->16 process3 dnsIp4 43 C:\Users\user\ZEMosgck\duUUkYQk.exe, PE32 8->43 dropped 45 C:\Users\user\AppData\...\AdobeARMHelper.exe, PE32 8->45 dropped 47 C:\ProgramData\uoQswgQk\kcwoAYwM.exe, PE32 8->47 dropped 49 C:\ProgramData\miQQkkEU\MaEkYIYI.exe, PE32 8->49 dropped 85 Uses cmd line tools excessively to alter registry or file data 8->85 87 Tries to detect virtualization through RDTSC time measurements 8->87 89 Drops executable to a common third party application directory 8->89 19 MaEkYIYI.exe 13 8->19         started        23 duUUkYQk.exe 8 8->23         started        25 cmd.exe 1 8->25         started        29 3 other processes 8->29 51 C:\RCXB1A7.tmp, PE32 12->51 dropped 53 C:\RCXB07D.tmp, PE32 12->53 dropped 55 C:\RCXAF9C.tmp, PE32 12->55 dropped 57 9 other files (5 malicious) 12->57 dropped 91 Injects code into the Windows Explorer (explorer.exe) 12->91 93 Infects executable files (exe, dll, sys, html) 12->93 27 explorer.exe 12->27         started        95 Antivirus detection for dropped file 14->95 97 Machine Learning detection for dropped file 14->97 99 Delayed program exit found 14->99 59 127.0.0.1 unknown unknown 16->59 61 192.168.2.1 unknown unknown 16->61 101 Changes security center settings (notifications, updates, antivirus, firewall) 16->101 103 Tries to harvest and steal browser information (history, passwords, etc) 16->103 file5 signatures6 process7 dnsIp8 63 200.87.164.69, 666 EntelSA-EntelNetBO Bolivia 19->63 65 190.186.45.170, 666 COTASLTDABO Bolivia 19->65 67 200.119.204.12, 666 COTASLTDABO Bolivia 19->67 77 Antivirus detection for dropped file 19->77 79 Machine Learning detection for dropped file 19->79 81 Tries to detect virtualization through RDTSC time measurements 19->81 83 Delayed program exit found 23->83 31 AdobeARMHelper.exe 1 2 25->31         started        33 conhost.exe 25->33         started        35 conhost.exe 29->35         started        37 conhost.exe 29->37         started        39 conhost.exe 29->39         started        signatures9 process10 process11 41 AdobeARM.exe 16 31->41         started       
Threat name:
Win32.Ransomware.VirLock
Status:
Malicious
First seen:
2021-01-10 17:47:37 UTC
File Type:
PE (Exe)
AV detection:
40 of 46 (86.96%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence spyware trojan
Behaviour
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Adds Run key to start application
JavaScript code in executable
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Modifies visibility of file extensions in Explorer
UAC bypass
Unpacked files
SH256 hash:
62acc5d1f03cb597ee923beb74381aa435097f9df0eb0663ee66f6dd40dfaa24
MD5 hash:
f9ac1a1c199391a3df13b5864ee0f250
SHA1 hash:
4b1c6f9e26547ce2bfcccf9cc13dfb59359a6da6
SH256 hash:
72e16f066186d8f1e8ca9faf096ad1b3b856c6c3387772738a9f41aaee637f4e
MD5 hash:
1fb422a1cded624230d9763aafa1bf81
SHA1 hash:
c60c1b89a5d1e8a6ab85b4a0bc9b443eb3e99ac7
SH256 hash:
4f7d6d263252612dc61309e405ede2302ea353afabd02867016ec26f252de763
MD5 hash:
b1ed9ffe3a99987f3dabc35f8644a76c
SHA1 hash:
c561eab302ba3e2dfedca4b9684fb275f2659367
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments