Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.eabq-244214b0d108e02493fab52a819e581925d7083dac9d82b2ca3133d7d363a47b
-
Size
76KB
-
MD5
f4aec740d3804cf861d32b8c01ca7393
-
SHA1
e41da234ec849779382c39d9ddbe8d785d9f3f25
-
SHA256
244214b0d108e02493fab52a819e581925d7083dac9d82b2ca3133d7d363a47b
-
SHA512
fb7983ae043585d7b0d277c973cdfd83f0ed7b6fcb2d6a186d675f9289e0bf17e3d5a16024f9e31de127d0b365e6bb3822ee7c0c9a91f2f67964d9256569adab
-
SSDEEP
1536:UAQ7CjRvKWe/ZA7psOYygg7o76pOIzT6RsOnBhE:PT91AZA1sqTpOoT3Eh
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Blocker.eabq-244214b0d108e02493fab52a819e581925d7083dac9d82b2ca3133d7d363a47b.exe windows x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
CODE Size: 66KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE