General
-
Target
LegionLocker3.0.exe
-
Size
3.0MB
-
Sample
210509-6lmtnjlrkj
-
MD5
cdccf5b587aac1a4aeb53f8aaa465759
-
SHA1
3d804d15282a5b031684cc6bd8b9b7d9d880d13d
-
SHA256
f6289c13d79d8de611e9c143602298970b5969c15a4d6a3e40efec794bc371dd
-
SHA512
61668842acbb52c8c1e35e5ba4cca412ea1a56b4de6e3adb58f158cee77f8e04e24be99bbbc92c5f551afc2bbe45cf9c99c7b0b63affb8cef3d6718dc0c950f3
Static task
static1
Behavioral task
behavioral1
Sample
LegionLocker3.0.exe
Resource
win7v20210410
Malware Config
Extracted
C:\Users\Admin\Desktop\LegionReadMe.txt
131fjhrB4wH8j6adZXudp1Wn23pR33tpAh
http://mail2tor2zyjdctd.onion/
Targets
-
-
Target
LegionLocker3.0.exe
-
Size
3.0MB
-
MD5
cdccf5b587aac1a4aeb53f8aaa465759
-
SHA1
3d804d15282a5b031684cc6bd8b9b7d9d880d13d
-
SHA256
f6289c13d79d8de611e9c143602298970b5969c15a4d6a3e40efec794bc371dd
-
SHA512
61668842acbb52c8c1e35e5ba4cca412ea1a56b4de6e3adb58f158cee77f8e04e24be99bbbc92c5f551afc2bbe45cf9c99c7b0b63affb8cef3d6718dc0c950f3
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-