Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Mor.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Mor.exe
Resource
win10v2004-20220901-en
General
-
Target
Trojan-Ransom.Win32.Mor.i-0c8a167874060828de2ce0b85ec804ab75c841c38f11e0fe7ed7bb7c18fc3e17
-
Size
102KB
-
MD5
eed51f0c07e1480f8f19fe989f2a3829
-
SHA1
3ded7c281b7698f730d0dbe5f0f1df66964397cb
-
SHA256
0c8a167874060828de2ce0b85ec804ab75c841c38f11e0fe7ed7bb7c18fc3e17
-
SHA512
b01b7c9fa7ab1713c1da0c02ab619618dd33a0f60b2e37d8d876e16d1b2973d02962d317d12966d19edac734c81bdbfbd9ac8f814f21236d40888c52a3e47f35
-
SSDEEP
1536:Y1uY+JBZqwp8pawuNjL1xPb9AKRR70bGl5AI2dSiUygG2UC:9YSbupafNf1xPb9AKEbAA9gG
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Mor.i-0c8a167874060828de2ce0b85ec804ab75c841c38f11e0fe7ed7bb7c18fc3e17.exe windows x86
4058537851c14c63d8677252ba3ffad5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetCursorPos
kernel32
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetExitCodeProcess
GetFileSize
GetLogicalDrives
ReadFile
SetEndOfFile
SetErrorMode
SetFilePointer
SetPriorityClass
Sleep
WaitForSingleObjectEx
WriteFile
lstrcatA
lstrcmpA
lstrcpyA
lstrlenA
shlwapi
PathFindFileNameA
advapi32
GetUserNameA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 794B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE