MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc2f4ddddfe19c9e54288d460f978c7623d0655685e8477c9a4ca8d8a3875997. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



VirLock


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: dc2f4ddddfe19c9e54288d460f978c7623d0655685e8477c9a4ca8d8a3875997
SHA3-384 hash: f431a744c68c6b54ee45ec79efc460438d61091d90d5beff9bc4848a69bbbfb5d46c7a946ebc8580f2af8c53048bd9f0
SHA1 hash: 1981841dd12353bd5f096a0219bee29d8aa6ce32
MD5 hash: a94909682a353a25c6f1eadc0a17cf38
humanhash: hotel-stream-music-four
File name:a9490968_by_Libranalysis
Download: download sample
Signature VirLock
File size:641'024 bytes
First seen:2021-05-05 09:02:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c6dd422531cdca4b6dbe4d6540eb25fc (1 x VirLock)
ssdeep 12288:wpN0GA+N1xJpAVi+X37K2IBtfutsRxwWmNHKaBjTm:+NGMJpoiy3e1vflR2KaRTm
Threatray 116 similar samples on MalwareBazaar
TLSH 01D46A3B1F0D5584DD73BE3F745D068184ED8948A610D63BE8BE3CD586AC90AE943FA8
Reporter Libranalysis


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
72
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Creating a process from a recently created file
Creating a service
Launching a service
Sending a UDP request
DNS request
Creating a file in the Windows subdirectories
Sending an HTTP GET request
Creating a file in the %temp% directory
Running batch commands
Deleting a recently created file
Launching a process
Creating a process with a hidden window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Enabling autorun
Brute forcing passwords of local accounts
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Ransomware.VirLock
Status:
Malicious
First seen:
2020-05-07 00:46:03 UTC
AV detection:
47 of 48 (97.92%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion persistence spyware stealer trojan
Behaviour
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Modifies WinLogon for persistence
Modifies visibility of file extensions in Explorer
UAC bypass
Unpacked files
SH256 hash:
b2780f5cc8b4aa720167e8b79acb5b671614eed9687a75e98bb41ae73387451f
MD5 hash:
3d1588a481e9cd4949e1ade2acd43685
SHA1 hash:
7d58ff5c06201f0b98ac06fcd0ca47fbb8692844
SH256 hash:
0a9fadcf3da543940115811efe20c61ea49b750358a5a83131eebaec689b82d0
MD5 hash:
5440a7be2a96a9a5270bc1a06ce3390c
SHA1 hash:
345363b0ef5b3d433e2221641eab02d8097dd7b2
SH256 hash:
2bd4c928753a447562530e1f32dd31fee1de76cdeadab37c83c1a45b2feb698f
MD5 hash:
7fbd30ed5b28ba2dfad7c64a3051977b
SHA1 hash:
faaee5c08323cc17c5ac1caa049ae9b942997888
SH256 hash:
dc2f4ddddfe19c9e54288d460f978c7623d0655685e8477c9a4ca8d8a3875997
MD5 hash:
a94909682a353a25c6f1eadc0a17cf38
SHA1 hash:
1981841dd12353bd5f096a0219bee29d8aa6ce32
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments