Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.alsa-0cd514ea881d524bae60691b458b682d82fa51a05bee748649f4a227a629d846
-
Size
21KB
-
MD5
f4dfb051712c015abbaa9a03a4a040e5
-
SHA1
75068f55b8f2df64880ba7c25c97843d4c618acc
-
SHA256
0cd514ea881d524bae60691b458b682d82fa51a05bee748649f4a227a629d846
-
SHA512
6b3366ba50399c8fe99690e232440683bbae45902becbdfcc6ba7591c10b8e386539528525b26faed6c1abad75308790c094de84b483c44f3f6de9fc6b43f3fc
-
SSDEEP
384:d0U7EzaqZs2ayunDhSmuyjmkxKkqLYNFz/KAVhxCsmelgNeuW:d0yE9/anDhSmuoxKKx/HzP
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Blocker.alsa-0cd514ea881d524bae60691b458b682d82fa51a05bee748649f4a227a629d846.exe windows x86
bcef681984890f1a362b7ed18e8c7dfd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord518
ord667
ord593
ord594
ord598
ord631
ord525
EVENT_SINK_AddRef
ord528
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord606
ord607
ord716
ord717
ProcCallEngine
ord537
ord644
ord100
ord616
ord617
ord619
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ