Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.jhyj-2ba854289b542fc39c3b8001f854c7c62af675015aa4d0484d395ca7e6429360
-
Size
56KB
-
MD5
ebc3aa817be88534833859355240f214
-
SHA1
5bf7b74490c0a692ed20d5e932598e8058fd765a
-
SHA256
2ba854289b542fc39c3b8001f854c7c62af675015aa4d0484d395ca7e6429360
-
SHA512
805bf4d929abb5c94a508ad6e0c9d2e7214139799c9b5aac64d4d2946a36d5fe136f17383edd1a7d7450db6f9b090d324c741eaa112ab347bdae6c4775541b66
-
SSDEEP
768:gIpQiI87jR723IeDDhg79dHTRQSFcU/KYI0S0QYY1fuxdBG0OiYnFv:gIpQiISjRq3IePhg37/s11fQrbOJnFv
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Blocker.jhyj-2ba854289b542fc39c3b8001f854c7c62af675015aa4d0484d395ca7e6429360.exe windows x86
94b59065e60a2b6a3008e82aebf8d7f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord660
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ProcCallEngine
ord100
ord612
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ