Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ivbx-c67033a25268e5990e8c33d797897635a7909a276ff7dd79c92a0949cb8868e0
-
Size
720KB
-
MD5
612b2303a60e398975c465df3d6f4b6b
-
SHA1
87ca186aa5ca28b777f238cb582823abf3820e30
-
SHA256
c67033a25268e5990e8c33d797897635a7909a276ff7dd79c92a0949cb8868e0
-
SHA512
2bc36e1c7f8e186cf02571d5c1a40c8cf62808382a1f505f65865eaa4d6496723e32c462d885ddee777c83aa8731ac5eba474d2da854bb8d5371c8b6a7d96041
-
SSDEEP
1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
Trojan-Ransom.Win32.Blocker.ivbx-c67033a25268e5990e8c33d797897635a7909a276ff7dd79c92a0949cb8868e0.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE