Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.hpql-5cf6a527ac527f0fd56504629a53fc7629c4c0c646a337b26dcd6c19682a9168
-
Size
140KB
-
MD5
281eec26034b0319867f224b7cca19c1
-
SHA1
553cffd4ed28a802393c07f6f925e829acf1788a
-
SHA256
5cf6a527ac527f0fd56504629a53fc7629c4c0c646a337b26dcd6c19682a9168
-
SHA512
4eaff9366867f4186bac9be07782f765712c3822464041331b453ab8a2205aa17860cc70441c2c1562b5f92a05ad6f92e6d9abe5e5950814cd42f38fe19ea734
-
SSDEEP
3072:TjBArAYoAyvCCSa3NFRlan7yPP4jbwR8b/VUDScNcw:TlAr+tSaymPP2bp/VUD7Nc
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Blocker.hpql-5cf6a527ac527f0fd56504629a53fc7629c4c0c646a337b26dcd6c19682a9168.exe windows x86
68d71565bd10c2b1ec1bd9786a75bc4f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord696
ord698
MethCallEngine
ord514
ord518
ord555
ord594
ord595
ord631
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord606
ord608
ord717
ord534
ProcCallEngine
ord644
ord570
ord578
ord100
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE