Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Cidox.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Cidox.dll
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Cidox.cii-6566596440fea122c3700cb59050ae2000621d85a7616e441b972e9c15d48d3f
-
Size
42KB
-
MD5
d6a3882f425bb4c68d8c173520b9147b
-
SHA1
1f9fe69eb6e3d8e2f62c82d21e93f17659d49ed2
-
SHA256
6566596440fea122c3700cb59050ae2000621d85a7616e441b972e9c15d48d3f
-
SHA512
24a5d55dac78b881044229d3e1f7ed9adec9a2aac028adb4ce0f48414f8998b45f0c653f67c8216fbb4376cb9484f84db53b43addd1900eee8600a7c0f9170a7
-
SSDEEP
768:/jqNLi1K/X23ezBxYdZOo55L92k1/+SJOydXm1o9Iv:/jCLi1OXpjYeg5L9V1/+6h2o2
Malware Config
Signatures
Files
-
Trojan-Ransom.Win32.Cidox.cii-6566596440fea122c3700cb59050ae2000621d85a7616e441b972e9c15d48d3f.dll windows x86
ef9206d7e50adf8af61984a903ed5943
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetCurrentThreadId
CloseHandle
GetTickCount
GetStdHandle
QueryPerformanceCounter
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapDestroy
HeapCreate
VirtualFree
HeapFree
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
RtlUnwind
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ