Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ivbx-abd783a5b7ab190f2c7d83df6244b28365b8ab3ee2ce37d706e848e846216e78
-
Size
1.4MB
-
MD5
f365d30c76abdae90c57ccdd40096427
-
SHA1
9d81510c38b32e03c78d7dd1366c4ca817891b96
-
SHA256
abd783a5b7ab190f2c7d83df6244b28365b8ab3ee2ce37d706e848e846216e78
-
SHA512
ac7a9e2eb4c377cf7b4579f4a43bee30c9b528d4be435c2e9f628ea5e3757a9b83caf38ac2052516db41b7abde24d3aea8f42e0a6b3265d82bd49510d6cae553
-
SSDEEP
1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
Trojan-Ransom.Win32.Blocker.ivbx-abd783a5b7ab190f2c7d83df6244b28365b8ab3ee2ce37d706e848e846216e78.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE