Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ivbx-8e3df0a49fbc9872d92eddd395ca8db10f26340b5e32e5e1cedfd5d2656a6a88
-
Size
268KB
-
MD5
e327d990385ffd98a719cf5fe88855be
-
SHA1
497ad872b743e33b9875b8f331762de9f62d163d
-
SHA256
8e3df0a49fbc9872d92eddd395ca8db10f26340b5e32e5e1cedfd5d2656a6a88
-
SHA512
2f6808e22da08f98f00bdf13e9b2e571e6e53c89b84f81dcae1dfa78e1e3a674fb02fffc208505631aa18815c3fac25f6e17ae0c7d551c8f3639809175336b15
-
SSDEEP
1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
Trojan-Ransom.Win32.Blocker.ivbx-8e3df0a49fbc9872d92eddd395ca8db10f26340b5e32e5e1cedfd5d2656a6a88.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE