6ffd90e8b1b4c38f801d2a694cd6c01c

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2010-Dec-09 18:58:13
Comments FileLocker
CompanyName system File-Locker Ransomware
FileDescription File-Locker
FileVersion 1.0.0.0
InternalName File-Locker Ransomware.exe
LegalCopyright Copyright © 2017
LegalTrademarks www.microsoft.com
OriginalFilename File-Locker Ransomware.exe
ProductName File-Locker
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0

Plugin Output

Info Matching compiler(s): Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ 8.0
.NET executable -> Microsoft
Suspicious The PE is possibly a dropper. Resources amount for 92.8484% of the executable.
Suspicious The file contains overlay data. 22788 bytes of data starting at offset 0x5c200.
The overlay data has an entropy of 7.62402 and is possibly compressed or encrypted.
Malicious VirusTotal score: 51/67 (Scanned on 2018-01-18 10:02:46) MicroWorld-eScan: Gen:Heur.Ransom.HiddenTears.1
nProtect: Ransom/W32.HiddenTear.400132
CAT-QuickHeal: Ransom.FileLocker.A3
ALYac: Trojan.Ransom.FileLocker
Malwarebytes: Ransom.HiddenTear
Zillya: Trojan.Filecoder.Win32.6921
CrowdStrike: malicious_confidence_60% (D)
K7GW: Trojan ( 004cd60c1 )
K7AntiVirus: Trojan ( 004cd60c1 )
Invincea: heuristic
Cyren: W32/Trojan.CKQY-1380
Symantec: Ransom.HiddenTear!g1
TrendMicro-HouseCall: Ransom_HiddenTear.R039C0DLL17
Avast: FileRepMalware
Kaspersky: HEUR:Trojan.Win32.Generic
BitDefender: Gen:Heur.Ransom.HiddenTears.1
NANO-Antivirus: Trojan.Win32.Filecoder.ewghqo
Paloalto: generic.ml
ViRobot: Trojan.Win32.Z.Ransom.400132
Tencent: Win32.Trojan.Generic.Wvbp
Ad-Aware: Gen:Heur.Ransom.HiddenTears.1
Emsisoft: Gen:Heur.Ransom.HiddenTears.1 (B)
Comodo: UnclassifiedMalware
F-Secure: Gen:Heur.Ransom.HiddenTears.1
DrWeb: Trojan.Encoder.24129
VIPRE: Trojan.Win32.Generic!BT
TrendMicro: Ransom_HiddenTear.R039C0DLL17
McAfee-GW-Edition: RDN/Ransom
SentinelOne: static engine - malicious
Jiangmin: Trojan/Jorik.htdp
Webroot: W32.Malware.Gen
Avira: TR/AD.Ryzerlo.uppvd
Fortinet: W32/Generic!tr
Antiy-AVL: Trojan[Ransom]/Win32.HiddenTear
Arcabit: Trojan.Ransom.HiddenTears.1
AegisLab: Troj.W32.Generic!c
ZoneAlarm: HEUR:Trojan.Win32.Generic
Microsoft: Ransom:Win32/HiddenTear.gen
Sophos: Mal/Generic-S
AhnLab-V3: Trojan/Win32.FileCoder.R216331
McAfee: RDN/Ransom
AVware: Trojan.Win32.Generic!BT
MAX: malware (ai score=99)
Cylance: Unsafe
ESET-NOD32: a variant of MSIL/Filecoder.Y
Ikarus: Trojan-Ransom.FileCoder
GData: Gen:Heur.Ransom.HiddenTears.1
AVG: FileRepMalware
Cybereason: malicious.1b8fb7
Panda: Trj/CI.A
Qihoo-360: Win32/Trojan.Ransom.786

Hashes

MD5 6ffd90e8b1b4c38f801d2a694cd6c01c
SHA1 424e9af78e781b7df2d30596c3c104ab672674b5
SHA256 b6b5e455c4ebe875907aa185988c2eb654ed373dc0e6b712a391069d63dc5c3f
SHA3 d594e1ae68825e82f6082a70ae3da2ae6e6c479540bb0f29aa531922d3f37a44
SSDeep 6144:56oGHbFoMvZY1WgOOA//m1Up+LUQXvMAo:OXYkvULbvBo
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x40
e_cp 0x1
e_crlc 0
e_cparhdr 0x2
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0xb400
e_oeminfo 0xcd09
e_lfanew 0x40

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2010-Dec-09 18:58:13
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 8.0
SizeOfCode 0x1000
SizeOfInitializedData 0x800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00002E5E (Section: .text)
BaseOfCode 0x2000
BaseOfData 0x4000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x62000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 f40bc66a6b32797172ea920134346d7c
SHA1 22a03cf8aed3f337e60ff53129a5dc45e0d70a68
SHA256 5811d0defcf1092b88f6b6ea94a3059feb2f0fe74f4771ca40d1108d747d9073
SHA3 b03b41f0820aa1a6a9cd540c6c482cbba0b77df8e934a4503ce1e1b32524d7d7
VirtualSize 0xe64
VirtualAddress 0x2000
SizeOfRawData 0x1000
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.29774

.rsrc

MD5 d37443f96142279f08687668e6a32587
SHA1 f2a251149cd497b8a1850103b92bbacb5f93cd67
SHA256 c16f1601cef92018fa9624afc53a34dd9050dc50326e5be5949f3806a00e8339
SHA3 7e48d3763c4549135babd408d633ef6201d8a399d28571a9bfbe57ac280dc6c0
VirtualSize 0x5ad64
VirtualAddress 0x4000
SizeOfRawData 0x5ae00
PointerToRawData 0x1200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.39113

.reloc

MD5 78aa4e443f044d753efd653bd4f46628
SHA1 391c9b296866a4a68be5fe594a9a8de913daaea1
SHA256 cad850a65062573215ddc2b6586e1b9ce55689af472294bd0e930aee425d50ad
SHA3 f2819eea1117928513782bdfed06cdc15460e883ca94d58b8d6a7900fa0a0cc7
VirtualSize 0xc
VirtualAddress 0x60000
SizeOfRawData 0x200
PointerToRawData 0x5c000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.45375

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x42028
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.21052
MD5 5a62f9fe211d3a17de58712d724f80c8
SHA1 3981d7aa4f8c5a05d3eee7abd984baee7ca52077
SHA256 37d1620ba1669f8fe881083c9e28dbca12b8cd26eda3c3eee74ffbc9a4cbf5e0
SHA3 5ecba2e838f989e9a8bd0801373a6ebd6640293cfba93800eaa9c9155929fa01

2

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.34446
MD5 77ba78cc2ba963fc3d08be2d55a91e1d
SHA1 1f384d2d217eab9de2eb6361ca1004cc85c9c2bd
SHA256 d118654c7de3e068b2425fee126f35fac38343251b5820076a4f3cca2c6e1005
SHA3 08894c59c1cd8d301c9e50c7a0b7dcdf07b4bc87cc5349177318f64c27f3631d

3

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.18907
MD5 ada34eeeeceab1dd26ae3ba5012e7b8d
SHA1 6b3bfd14e7bb03780e70b729ad412bb9806fdad6
SHA256 4a1ca9269f732c0d5b88b8b0354873279a6d2dbab40722ab4ca80ec30e3734fd
SHA3 0d404f16b4f3b2ff6151e90b9630c756c46e6a4911e43dc053c4c80eaad6c572

4

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.59472
MD5 c3c8aaff5329b56ac889b8055d475642
SHA1 25b6ed934cef738aa32d092c0281c9a06310398f
SHA256 1fc640a3a0413ce297ea7be74e692e67b6ad99d4bdb71f5cc0ad406c31419ad1
SHA3 ff8ea7b4e612b7849ab420604d23c1c79feef82608bad190c22ac5428470eccc

5

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.46288
MD5 6bd16f10e4747efaf78624a813945d34
SHA1 53ee8d048f4e82df64022d4837979816c38e5d02
SHA256 3e626d88fc2f9855c40017445c75b16b2e448729da8f87b6ae7c0baf8191bf38
SHA3 f3e1ae46f4ec99b20768f4f7729500024d4fb626ac29e6d2b5c0045cd34a863f

6

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.91173
MD5 68162dbb555f446007edb9315dbabd95
SHA1 f285505d62ebfe8570d59de4a1f00d57cb5bb0ac
SHA256 76013d5e666a004f580e1546580b1ff131cbd6d8137d593857720becf6463e14
SHA3 66d8bbac3879ced2118700f5d3238c9ce9f476dab6dc116fac702118dded24cd

32512

Type RT_GROUP_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.76511
Detected Filetype Icon file
MD5 4c4b448a0dae62377a9452aee6574387
SHA1 bd5e305eb640dabfba0a2b1e192f3e05e69892dd
SHA256 b3d066b10578e4a63a9e16dd19918531242399758b182986710b62975fe24574
SHA3 5ee375d929f0fb67eab18d6fa5e3b3978743347a3757f350bc2794c1955013bf

1 (#2)

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x3c8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.32878
MD5 187d0c19502d7bc66179646b519969e6
SHA1 072cd844209aa13d88e783dce2b3a60d61bc74e1
SHA256 c0f21e4cce83517c4cf8191bbb83f759bdbc4e4359d3da95db493f4b50920e19
SHA3 db2933e032f8798d4f0498bc571a827cf5e1f3a2624de6c38962b6c81f8e90d8

1 (#3)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 b7db84991f23a680df8e95af8946f9c9
SHA1 cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3 4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments FileLocker
CompanyName system File-Locker Ransomware
FileDescription File-Locker
FileVersion (#2) 1.0.0.0
InternalName File-Locker Ransomware.exe
LegalCopyright Copyright © 2017
LegalTrademarks www.microsoft.com
OriginalFilename File-Locker Ransomware.exe
ProductName File-Locker
ProductVersion (#2) 1.0.0.0
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->