Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ileg-56d2dfc5bfdb781e073e136ff08d63146e1c2ae078ac2bc26dfdaa5d957384e6
-
Size
1.2MB
-
MD5
e482b9efb94eb490dafd3880e44c0961
-
SHA1
d4fca0aeb520d1285de86bb2f21fb261e8d8768f
-
SHA256
56d2dfc5bfdb781e073e136ff08d63146e1c2ae078ac2bc26dfdaa5d957384e6
-
SHA512
80612e6f9b05c0391bee01fcb96e879ccbe3d7ebc5774b3182c7c2a304b0493b191f2f1c8b5fbdec76d9ff57f609b4f25d85b4ec72c528e7f23fbaf76672ac7b
-
SSDEEP
12288:AI2lboxJeJfEuGstgg/kjp98zHpie5tovg/oowBOMKI3/SMNCu:AI2mJeJfAqkjp98zHpieToUolBD368Cu
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
Trojan-Ransom.Win32.Blocker.ileg-56d2dfc5bfdb781e073e136ff08d63146e1c2ae078ac2bc26dfdaa5d957384e6.exe windows x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
.text Size: 27KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE