Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ivbx-a097c8b9fa580c1309f409f2639f6529fdd02728f4114908a0c3ea68b59ed90e
-
Size
1.9MB
-
MD5
d620d4cb02862f5e46c35f442a013570
-
SHA1
639ef21f83176b314244cbcaa97e90dbbfb0b2ac
-
SHA256
a097c8b9fa580c1309f409f2639f6529fdd02728f4114908a0c3ea68b59ed90e
-
SHA512
7f94267e0530ca6607cac4c511512c7952285a9b76e6234ef4af5699fedcbd113bbe36030ca6aaa7a36c8a8b464d53eca16a1153a36414303cb337952c576769
-
SSDEEP
1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
Trojan-Ransom.Win32.Blocker.ivbx-a097c8b9fa580c1309f409f2639f6529fdd02728f4114908a0c3ea68b59ed90e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE