aa18e8176e1673368b4e4e3e71b9a21f

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2083-Nov-01 08:55:44
Debug artifacts C:\Users\novel\source\repos\blocky\blocky\obj\Debug\blocky.pdb
Comments
CompanyName
FileDescription blocky
FileVersion 1.0.0.0
InternalName blocky.exe
LegalCopyright Copyright © 2020
LegalTrademarks
OriginalFilename blocky.exe
ProductName blocky
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0

Plugin Output

Info Interesting strings found in the binary: Contains domain names:
  • en.wikipedia.org
  • epizy.com
  • flowers.epizy.com
  • google.com
  • http://rose-flowers.epizy.com
  • http://rose-flowers.epizy.com/write.php
  • https://cex.io
  • https://en.wikipedia.org
  • https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
  • https://en.wikipedia.org/wiki/RSA_
  • https://www.google.com
  • rose-flowers.epizy.com
  • wikipedia.org
  • www.google.com
Malicious VirusTotal score: 58/71 (Scanned on 2020-08-02 23:39:01) FireEye: Generic.mg.aa18e8176e167336
CAT-QuickHeal: Trojan.Generic
Qihoo-360: Generic/HEUR/QVM03.0.2A5F.Malware.Gen
McAfee: Ransomware-FTD!AA18E8176E16
Malwarebytes: Ransom.HiddenTear
Zillya: Trojan.Filecoder.Win32.15031
Sangfor: Malware
K7AntiVirus: Trojan ( 700000121 )
Alibaba: Ransom:MSIL/Ryzerlo.f40cdede
K7GW: Trojan ( 700000121 )
Cybereason: malicious.76e167
TrendMicro: Ransom_CRYPTEAR.SM0
Cyren: W32/Ransom.IQ.gen!Eldorado
Symantec: Ransom.HiddenTear!g1
ESET-NOD32: a variant of MSIL/Filecoder.Y
APEX: Malicious
Paloalto: generic.ml
Cynet: Malicious (score: 85)
Kaspersky: HEUR:Trojan.Win32.Generic
BitDefender: Generic.Ransom.Hiddentear.A.288C180F
NANO-Antivirus: Trojan.Win32.Encoder.hmcaeh
ViRobot: Trojan.Win32.Z.Ransom.16896.E
MicroWorld-eScan: Generic.Ransom.Hiddentear.A.288C180F
Avast: Win32:Trojan-gen
Ad-Aware: Generic.Ransom.Hiddentear.A.288C180F
Sophos: Troj/Cryptear-A
Comodo: Malware@#31c30ghw5gpcx
F-Secure: Trojan.TR/Ransom.llbnu
DrWeb: Trojan.Encoder.10598
VIPRE: Trojan.Win32.Generic!BT
Emsisoft: Generic.Ransom.Hiddentear.A.288C180F (B)
Ikarus: Trojan-Ransom.FileCrypter
F-Prot: W32/Ransom.IQ.gen!Eldorado
Jiangmin: Trojan.Generic.fpbiz
Webroot: W32.Ransom.Gen
Avira: TR/Ransom.llbnu
Antiy-AVL: Trojan/MSIL.Filecoder
Microsoft: Ransom:MSIL/Ryzerlo.A
Endgame: malicious (high confidence)
Arcabit: Generic.Ransom.Hiddentear.A.288C180F
AegisLab: Trojan.Win32.Generic.4!c
ZoneAlarm: HEUR:Trojan.Win32.Generic
GData: Generic.Ransom.Hiddentear.A.288C180F
TACHYON: Ransom/W32.DN-Blocky.16896
ALYac: Trojan.Ransom.HiddenTear
MAX: malware (ai score=100)
VBA32: TScope.Trojan.MSIL
Cylance: Unsafe
TrendMicro-HouseCall: Ransom_CRYPTEAR.SM0
Rising: Ransom.HiddenTear!1.C60C (CLOUD)
Yandex: Trojan.Filecoder!8sVt8yywBH4
SentinelOne: DFI - Malicious PE
eGambit: Unsafe.AI_Score_89%
Fortinet: MSIL/Filecoder.AK!tr.ransom
BitDefenderTheta: Gen:NN.ZemsilF.34144.bm0@a8xuYhb
AVG: Win32:Trojan-gen
Panda: Trj/GdSda.A
CrowdStrike: win/malicious_confidence_90% (W)

Hashes

MD5 aa18e8176e1673368b4e4e3e71b9a21f
SHA1 54972cf4bf28fdf69fc15c5f54dd49c162841d74
SHA256 454756725d005fcf54483bf6b6ae28e3966633728d6bd750d4e5236077487771
SHA3 f7f0b67802d469606cc15317ca0a83fb3fd071672c80379e1e268ad010aed6aa
SSDeep 192:f0hZzBkgSkmoLx0CCay4+XsBnrbuTrmhxsm+hJOWAMSljv/+1im5c5zlz5aLfiH:MhkgS2hBrT0OWfSlDAXagLiHwfZ
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2083-Nov-01 08:55:44
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 48.0
SizeOfCode 0x3800
SizeOfInitializedData 0x800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000055FA (Section: .text)
BaseOfCode 0x2000
BaseOfData 0x6000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xa000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 aa1c3b9e2ad0ec3861c594edc69fc3ad
SHA1 6fea05132af20f3a7b3da7d0b4754ef5a49b4537
SHA256 4d23a5fc73823cb3be82da756641981a7c359dbe53e0f6eb120c6ab4fedab5a6
SHA3 269ad58cbdfabb5db0f9a0c3ce3be27ce13e446f6331ebb0ca80427becbb8f33
VirtualSize 0x3608
VirtualAddress 0x2000
SizeOfRawData 0x3800
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.39351

.rsrc

MD5 41ee2b465b7dbbbfa0f2b58bf2b23d49
SHA1 c48eeca0aa2cb1be83382b9c0c670dbb3004de10
SHA256 8013bc04319a4ff73b53fd4197977bceef2d172b9eca222738a3830cb93900af
SHA3 2771a70173ca7df4c9e85356e5baddea853d4fd9a9abf67e4791ac1d9c1f0e4f
VirtualSize 0x59c
VirtualAddress 0x6000
SizeOfRawData 0x600
PointerToRawData 0x3a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.03539

.reloc

MD5 951094a87312b1c5605c9cce16a5e6c3
SHA1 29db25f1b24a47fbe4254577516b31e80ff43df5
SHA256 17f43e8f37c325a1a46fa47bb0aa20b9173c4c1060a4d6412bab870e6b494214
SHA3 bf202ed6c8c399970ac24c458a369c0e835141559dcbe1286f4816afb5790b69
VirtualSize 0xc
VirtualAddress 0x8000
SizeOfRawData 0x200
PointerToRawData 0x4000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.0815394

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x30c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.2417
MD5 b4abd6ca37c930c38f49279fa1d84a4a
SHA1 90dde9a5ad75339adecbec8e3133e2f2551b65ec
SHA256 8b68dae89281f9da6e0fb662a9afbcedb9024d42720a1f54d69947e4e95a641a
SHA3 b314f8b6d73f90aa93e9b203b8aa9427dc97c56048e4ccc4d2076f738738be48

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 b7db84991f23a680df8e95af8946f9c9
SHA1 cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3 4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments
CompanyName
FileDescription blocky
FileVersion (#2) 1.0.0.0
InternalName blocky.exe
LegalCopyright Copyright © 2020
LegalTrademarks
OriginalFilename blocky.exe
ProductName blocky
ProductVersion (#2) 1.0.0.0
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2084-Feb-17 00:44:40
Version 0.0
SizeofData 87
AddressOfRawData 0x5550
PointerToRawData 0x3750
Referenced File C:\Users\novel\source\repos\blocky\blocky\obj\Debug\blocky.pdb

UNKNOWN

Characteristics 0
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->