Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ivbx-38bcd96567a5c79963946c712ae76b542a1f1a60b7aeb21960050808752ae548
-
Size
1005KB
-
MD5
116cb28c39c496e5033e29ccea3f5984
-
SHA1
05a4de1ceaf50bae4598cbcc22493154cb2ff7f7
-
SHA256
38bcd96567a5c79963946c712ae76b542a1f1a60b7aeb21960050808752ae548
-
SHA512
75b485b8a3dae1a658e97c2a2dc74c85d74f25a05ea6c7c62d907c601563ca05a20906dc4b5ab6dcc8c44a62644e1c1caef4b1e805b7d1f984088ba7b242991b
-
SSDEEP
1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
Trojan-Ransom.Win32.Blocker.ivbx-38bcd96567a5c79963946c712ae76b542a1f1a60b7aeb21960050808752ae548.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE