MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 81129e5c3a3cd0a68afcb092c579676d04bb75a3a27aad561078504a13531b38. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



VirLock


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 81129e5c3a3cd0a68afcb092c579676d04bb75a3a27aad561078504a13531b38
SHA3-384 hash: 4ca1fadf57a8a620ebe2d3f44b468d4c6de911a4720d0a9fa8829c57cee8dffae3c79ff2ca7109f53e4423cd709c1d3b
SHA1 hash: f34a473723a7d2b3cf1fcb82f0df4c99ccafb4be
MD5 hash: f5077797519bf0ddc532142daeaa2b30
humanhash: carolina-twelve-florida-bakerloo
File name:f5077797_by_Libranalysis
Download: download sample
Signature VirLock
File size:643'072 bytes
First seen:2021-05-05 09:04:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bfbeca9cb7c60b581f72f04c50e63b83 (1 x VirLock)
ssdeep 12288:WkQnm2u83e283Ihynb91rG7vtM/lSq6nTpXj8Tm:1d2jOXb91C7vtCrTm
Threatray 85 similar samples on MalwareBazaar
TLSH C1D4AD28B6DEE327F497F67D605C674857FE0F06FB52BB9C051818ECA8EA244B464438
Reporter Libranalysis


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a file
Creating a process from a recently created file
Creating a service
Launching a service
Creating a file in the Windows subdirectories
Creating a file in the %temp% directory
Running batch commands
Deleting a recently created file
Sending an HTTP GET request
Launching a process
Creating a process with a hidden window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Enabling autorun
Brute forcing passwords of local accounts
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Ransomware.VirLock
Status:
Malicious
First seen:
2020-05-07 00:38:06 UTC
AV detection:
45 of 48 (93.75%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence spyware stealer trojan
Behaviour
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Modifies WinLogon for persistence
Modifies visibility of file extensions in Explorer
UAC bypass
Unpacked files
SH256 hash:
f77f2b411402be7c86f55540fac3d34b32cad1c0531d31a6ecba879c5339f0eb
MD5 hash:
b6d816a9f21774609335a8d43b578b08
SHA1 hash:
2ab3c974de3796484e20df08c77a6a41764793c0
SH256 hash:
19ae1fa48334b1a8b2ab01c33a8e0bbc750ff72828db4cddc870f2747abe7656
MD5 hash:
737289ceb4e2e2fb492d310b8ecbeec5
SHA1 hash:
8b1278998b3cb8d8f520fe944438a490dc0ce150
SH256 hash:
9c799724c666fe5914b78c115b451f97650b4994d9129e2ea0126ec0335e820b
MD5 hash:
aa9d2269972239dc5f41ce3f49cd404e
SHA1 hash:
8bf6f3bf5f26835ee173b2976327e72ef552dd3d
SH256 hash:
81129e5c3a3cd0a68afcb092c579676d04bb75a3a27aad561078504a13531b38
MD5 hash:
f5077797519bf0ddc532142daeaa2b30
SHA1 hash:
f34a473723a7d2b3cf1fcb82f0df4c99ccafb4be
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments