Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ivbx-1406a96cde0f73d9a45cd4220dd7e16e26ab7b6888c758790a900428119c521e
-
Size
852KB
-
MD5
17584699d1e27346c718fe55f7b598a6
-
SHA1
b94a0a3e6f20a84f04e6fc100e67f3c38a7cae87
-
SHA256
1406a96cde0f73d9a45cd4220dd7e16e26ab7b6888c758790a900428119c521e
-
SHA512
27176e199ab1c710f8eedb3792764761da99fb9dd7174c8649f9aeb989933c4ef529c8b4e5764bfea7357d6f990ea6490ec80234da39dce39297fb347268d8ae
-
SSDEEP
1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
Trojan-Ransom.Win32.Blocker.ivbx-1406a96cde0f73d9a45cd4220dd7e16e26ab7b6888c758790a900428119c521e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE