Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.MSIL.Agent.gen-b43853b0cf911db59117c70e34e373c47235ceff58f226d2bb72abb5f0c49416.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Ransom.MSIL.Agent.gen-b43853b0cf911db59117c70e34e373c47235ceff58f226d2bb72abb5f0c49416.exe
Resource
win10v2004-20220812-en
General
-
Target
HEUR-Trojan-Ransom.MSIL.Agent.gen-b43853b0cf911db59117c70e34e373c47235ceff58f226d2bb72abb5f0c49416.exe
-
Size
14KB
-
MD5
1d67ad9ff37e4fd8c3d6b2eeaea6ef97
-
SHA1
b8e7d26fd11bc747662665dd24fa7b46e99522cb
-
SHA256
b43853b0cf911db59117c70e34e373c47235ceff58f226d2bb72abb5f0c49416
-
SHA512
489641c86fe8619cc25439625af0ab8bf6bd36135319c0fd46602275772ad6a8a0bf18e4762ddb352a11215619aa92bb8c1fdbd0ba808adafaf117cf64f01dd4
-
SSDEEP
192:AqX2hHT/DAZb6R/NjkxizbNjL1VhS8MC3fV6nopLCRntOwyfNnBq:76z/0Zb6BiozBNVtMMfkn4ItO/fJB
Malware Config
Signatures
-
Detected LegionLocker ransomware 1 IoCs
Sample contains strings associated with the LegionLocker family.
resource yara_rule sample family_legionlocker -
Legionlocker family
Files
-
HEUR-Trojan-Ransom.MSIL.Agent.gen-b43853b0cf911db59117c70e34e373c47235ceff58f226d2bb72abb5f0c49416.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ