Behavioral task
behavioral1
Sample
extracted_at_0x7f7c556.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
extracted_at_0x7f7c556.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
extracted_at_0x7f7c556.exe
-
Size
5.0MB
-
MD5
4eb8550265e0e9bf82e74351773e130d
-
SHA1
3a9d27e2592f0d9bbdeed0b2ece83f2e7bced8ae
-
SHA256
30b4b72906ad5f54287f45b28625d638061ad5260c007ac1f4213ad866693575
-
SHA512
faa94e5430fab532ce4783c0fd74885365261279674e633e7c0953afb9cdf33e3b5191f8c64ef6ad5fe293d3b40f05ea43d6baf3c809d40bfd4f6427bf446871
-
SSDEEP
49152:h72qytx8dkMPlVbQDXXYjIf9OItcOrDZAgPa3:hZkTLXZ9EQZNPU
Score
10/10
Malware Config
Signatures
-
Detected LegionLocker ransomware 1 IoCs
Sample contains strings associated with the LegionLocker family.
resource yara_rule sample family_legionlocker -
Legionlocker family
Files
-
extracted_at_0x7f7c556.exe.exe .js windows x86