Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2083-Nov-01 08:55:44 |
Debug artifacts |
C:\Users\novel\source\repos\blocky\blocky\obj\Debug\blocky.pdb
|
Comments | |
CompanyName | |
FileDescription | blocky |
FileVersion | 1.0.0.0 |
InternalName | blocky.exe |
LegalCopyright | Copyright © 2020 |
LegalTrademarks | |
OriginalFilename | blocky.exe |
ProductName | blocky |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Info | Interesting strings found in the binary: |
Contains domain names:
|
Malicious | VirusTotal score: 58/71 (Scanned on 2020-08-02 23:39:01) |
FireEye:
Generic.mg.aa18e8176e167336
CAT-QuickHeal: Trojan.Generic Qihoo-360: Generic/HEUR/QVM03.0.2A5F.Malware.Gen McAfee: Ransomware-FTD!AA18E8176E16 Malwarebytes: Ransom.HiddenTear Zillya: Trojan.Filecoder.Win32.15031 Sangfor: Malware K7AntiVirus: Trojan ( 700000121 ) Alibaba: Ransom:MSIL/Ryzerlo.f40cdede K7GW: Trojan ( 700000121 ) Cybereason: malicious.76e167 TrendMicro: Ransom_CRYPTEAR.SM0 Cyren: W32/Ransom.IQ.gen!Eldorado Symantec: Ransom.HiddenTear!g1 ESET-NOD32: a variant of MSIL/Filecoder.Y APEX: Malicious Paloalto: generic.ml Cynet: Malicious (score: 85) Kaspersky: HEUR:Trojan.Win32.Generic BitDefender: Generic.Ransom.Hiddentear.A.288C180F NANO-Antivirus: Trojan.Win32.Encoder.hmcaeh ViRobot: Trojan.Win32.Z.Ransom.16896.E MicroWorld-eScan: Generic.Ransom.Hiddentear.A.288C180F Avast: Win32:Trojan-gen Ad-Aware: Generic.Ransom.Hiddentear.A.288C180F Sophos: Troj/Cryptear-A Comodo: Malware@#31c30ghw5gpcx F-Secure: Trojan.TR/Ransom.llbnu DrWeb: Trojan.Encoder.10598 VIPRE: Trojan.Win32.Generic!BT Emsisoft: Generic.Ransom.Hiddentear.A.288C180F (B) Ikarus: Trojan-Ransom.FileCrypter F-Prot: W32/Ransom.IQ.gen!Eldorado Jiangmin: Trojan.Generic.fpbiz Webroot: W32.Ransom.Gen Avira: TR/Ransom.llbnu Antiy-AVL: Trojan/MSIL.Filecoder Microsoft: Ransom:MSIL/Ryzerlo.A Endgame: malicious (high confidence) Arcabit: Generic.Ransom.Hiddentear.A.288C180F AegisLab: Trojan.Win32.Generic.4!c ZoneAlarm: HEUR:Trojan.Win32.Generic GData: Generic.Ransom.Hiddentear.A.288C180F TACHYON: Ransom/W32.DN-Blocky.16896 ALYac: Trojan.Ransom.HiddenTear MAX: malware (ai score=100) VBA32: TScope.Trojan.MSIL Cylance: Unsafe TrendMicro-HouseCall: Ransom_CRYPTEAR.SM0 Rising: Ransom.HiddenTear!1.C60C (CLOUD) Yandex: Trojan.Filecoder!8sVt8yywBH4 SentinelOne: DFI - Malicious PE eGambit: Unsafe.AI_Score_89% Fortinet: MSIL/Filecoder.AK!tr.ransom BitDefenderTheta: Gen:NN.ZemsilF.34144.bm0@a8xuYhb AVG: Win32:Trojan-gen Panda: Trj/GdSda.A CrowdStrike: win/malicious_confidence_90% (W) |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x80 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 3 |
TimeDateStamp | 2083-Nov-01 08:55:44 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
Magic | PE32 |
---|---|
LinkerVersion | 48.0 |
SizeOfCode | 0x3800 |
SizeOfInitializedData | 0x800 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x000055FA (Section: .text) |
BaseOfCode | 0x2000 |
BaseOfData | 0x6000 |
ImageBase | 0x400000 |
SectionAlignment | 0x2000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 4.0 |
ImageVersion | 0.0 |
SubsystemVersion | 6.0 |
Win32VersionValue | 0 |
SizeOfImage | 0xa000 |
SizeOfHeaders | 0x200 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
mscoree.dll |
_CorExeMain
|
---|
Signature | 0xfeef04bd |
---|---|
StructVersion | 0x10000 |
FileVersion | 1.0.0.0 |
ProductVersion | 1.0.0.0 |
FileFlags | (EMPTY) |
FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
FileType |
VFT_APP
|
Language | UNKNOWN |
Comments | |
CompanyName | |
FileDescription | blocky |
FileVersion (#2) | 1.0.0.0 |
InternalName | blocky.exe |
LegalCopyright | Copyright © 2020 |
LegalTrademarks | |
OriginalFilename | blocky.exe |
ProductName | blocky |
ProductVersion (#2) | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Resource LangID | UNKNOWN |
---|
Characteristics |
0
|
---|---|
TimeDateStamp | 2084-Feb-17 00:44:40 |
Version | 0.0 |
SizeofData | 87 |
AddressOfRawData | 0x5550 |
PointerToRawData | 0x3750 |
Referenced File | C:\Users\novel\source\repos\blocky\blocky\obj\Debug\blocky.pdb |
Characteristics |
0
|
---|---|
TimeDateStamp | 1970-Jan-01 00:00:00 |
Version | 0.0 |
SizeofData | 0 |
AddressOfRawData | 0 |
PointerToRawData | 0 |