Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ivbx-731aafbb10ced6d35323e5b6e9f915064aa49e36e356beb09cfc30c4c5a22c57
-
Size
1012KB
-
MD5
4fa272ae83e273967e81ad7b461200fc
-
SHA1
6d8c06f9c277f32e110eb43f41a8eda2a7dd1f40
-
SHA256
731aafbb10ced6d35323e5b6e9f915064aa49e36e356beb09cfc30c4c5a22c57
-
SHA512
ae781e4f679290ea3cfe31c22197d82b6c409c220a064a7b52ecfd2cc130c170b45cc617f24f3f4427bd04275e51be867c445ec677d1d57dce0c53ee1e99c9b9
-
SSDEEP
1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
Trojan-Ransom.Win32.Blocker.ivbx-731aafbb10ced6d35323e5b6e9f915064aa49e36e356beb09cfc30c4c5a22c57.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE