Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.dopg-6d23133cc2b9d0d7787bafcd36712696470ca26a62e4a902e51c45e691e48aa4
-
Size
1.4MB
-
MD5
652d74094e72b6c3e51a75c6d350c896
-
SHA1
67e11c27b493946e66c6aa67301d3d190e5d176c
-
SHA256
6d23133cc2b9d0d7787bafcd36712696470ca26a62e4a902e51c45e691e48aa4
-
SHA512
fe58b350551e2bba1e160d64d42f1f3c28a88cc4364a32ea5ead9dd479224d58b31e204acedfa007170ea5587919d2061d2f15fd128996b3ce1fb41c1ed0b428
-
SSDEEP
24576:oN9QNHMEMPAhssp0ZCB3WynPPKOWPSrubnUOv0OnJXWqhOYdQHRoNmLY06u/PLx+:296DM4i8PnPRoSyYO8gmqP2Ro0LYILd6
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Blocker.dopg-6d23133cc2b9d0d7787bafcd36712696470ca26a62e4a902e51c45e691e48aa4.exe windows x86
baa93d47220682c04d92f7797d9224ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Sections
Size: 160KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iufhsqee Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zzmmplpe Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE