Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.ivbx-d2281737901b25b5dbe1a37eb8f337885606304a6321e0b4eafc3d5c23781d33
-
Size
569KB
-
MD5
5137392c6649ebde4402ee554a51e244
-
SHA1
2b68873a44a0696376e9003b8d662f0ce9bab183
-
SHA256
d2281737901b25b5dbe1a37eb8f337885606304a6321e0b4eafc3d5c23781d33
-
SHA512
efb1f82ce47159f01b445ad9e7a9ce03dfee459cb4f745aa1a84ad6b3abbbcd48be3a90466f1bd6a41bf31b5a67cd02b1c7e5787a087fe20b796072bce95e7ea
-
SSDEEP
1536:+EfFNvtgmAl7z5dKY6yuJPW8K43w9NXOM1aRl/i6JWT0S9yXnBibnouy8gHn2JX:+YLmGO4W849NXO9RlK6gOxiDouto2N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
Trojan-Ransom.Win32.Blocker.ivbx-d2281737901b25b5dbe1a37eb8f337885606304a6321e0b4eafc3d5c23781d33.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE