Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ivbx-97950054efb621b76d951c919a605d9fa02f0d1e8a37a008ab29f08cdf60c404
-
Size
1.8MB
-
MD5
c0f9426e0e78878d3798914b346da958
-
SHA1
35dfa6d048d5915d4d824cc49f82d7e7307e3c58
-
SHA256
97950054efb621b76d951c919a605d9fa02f0d1e8a37a008ab29f08cdf60c404
-
SHA512
dc521fb3df3d8529ced54a5e4a69e260576f14b57b2751c8d7e3cd164c16b9996f89984de2f8c132da0a60d3bcb6eace31c398e17ac88a77ad2c8fcc6a0c3d4f
-
SSDEEP
1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
Trojan-Ransom.Win32.Blocker.ivbx-97950054efb621b76d951c919a605d9fa02f0d1e8a37a008ab29f08cdf60c404.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE