General
-
Target
LegionLocker.exe
-
Size
6.6MB
-
Sample
220208-qpljvsgha2
-
MD5
9a72a508fcee3de957167a386f173c44
-
SHA1
55650582fc704d27cd7d95f971b0ddd13dcd9eaf
-
SHA256
22b1a6c34e47c23083fc1d2e3d01bc9dbd3fd4429e13aad6797ad41313447708
-
SHA512
fb8073e5d0c14dbe1780bed15b6a492c0db386acb56b834f56eae9d76cf9872dd95396fd8d6d06048864227fcc90f8cae9d7853169536835a183ea2099994262
Static task
static1
Behavioral task
behavioral1
Sample
LegionLocker.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
LegionLocker.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
LegionLocker.exe
-
Size
6.6MB
-
MD5
9a72a508fcee3de957167a386f173c44
-
SHA1
55650582fc704d27cd7d95f971b0ddd13dcd9eaf
-
SHA256
22b1a6c34e47c23083fc1d2e3d01bc9dbd3fd4429e13aad6797ad41313447708
-
SHA512
fb8073e5d0c14dbe1780bed15b6a492c0db386acb56b834f56eae9d76cf9872dd95396fd8d6d06048864227fcc90f8cae9d7853169536835a183ea2099994262
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-