Ransom Trojan

What is “Trojan-Ransom.Win32.Blocker.lehg”?

Malware Removal

The Trojan-Ransom.Win32.Blocker.lehg is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Ransom.Win32.Blocker.lehg virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs HTTP requests potentially not found in PCAP.
  • HTTPS urls from behavior.
  • Starts servers listening on 0.0.0.0:10063, :0, 127.0.0.1:10000
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Collects and encrypts information about the computer likely to send to C2 server
  • Detects the presence of Wine emulator via registry key
  • Attempts to modify proxy settings

How to determine Trojan-Ransom.Win32.Blocker.lehg?


File Info:

name: 88751AA0973EBA86C45F.mlw
path: /opt/CAPEv2/storage/binaries/2a1df7c802608d0bf4f7cfc8e1ab56c8a386c6f674fa97389d0ead6a1478a57c
crc32: C5228268
md5: 88751aa0973eba86c45fa61c8a3880f6
sha1: 543cd71c286d7a6d857cbf729bec29ad50acabd2
sha256: 2a1df7c802608d0bf4f7cfc8e1ab56c8a386c6f674fa97389d0ead6a1478a57c
sha512: ffce656890cc4883ce2bb52c64d7dbab7d1af694de7338ab71b3174d1139d611e05d1f1b8f3e5d0e0804d5172333ccf90529d63ca3bf4e045ce79b9cd5907364
ssdeep: 196608:1604dQaORKjSIs9PD2FNUugG/LUQhbehFZJomAEXTjA1OPME1//EeaVwxnG960Qa:1MuEZsl6FeKZhbGoJWEk4H91e8wYH
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C6C63393DF32EB41DC844C758E9484038AE775B94F7509997218BA9D22EFEF6C04278E
sha3_384: 5214361ea87d07efb0e540029ae52a7fd9e59c0e429837395ff574e1e5978b91f46fc5f59bd20a03ac309c3595c5718f
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Setup Setup
FileVersion:
LegalCopyright:
ProductName: Setup
ProductVersion:
Translation: 0x0000 0x04b0

Trojan-Ransom.Win32.Blocker.lehg also known as:

LionicTrojan.Win32.Blocker.j!c
CylanceUnsafe
SangforRansom.Win32.Blocker.lehg
CyrenW32/Wdfload.B.gen!Eldorado
SymantecTrojan.Gen.2
ESET-NOD32a variant of Win32/uTorrent.D potentially unwanted
TrendMicro-HouseCallRansom_Blocker.R002C0DCK22
KasperskyTrojan-Ransom.Win32.Blocker.lehg
RisingPUA.Conduit!8.122 (CLOUD)
DrWebTrojan.DownLoader27.20803
ZillyaTrojan.Blocker.Win32.40198
TrendMicroRansom_Blocker.R002C0DCK22
McAfee-GW-EditionBehavesLike.Win32.AdwareFileTour.wc
SophosMal/Generic-S
WebrootW32.Adware.Gen
MicrosoftRansom:Win32/Blocker
McAfeeArtemis!88751AA0973E
VBA32TrojanRansom.Blocker
TencentWin32.Trojan.Blocker.Ebgv
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Blocker.LEHG!tr

How to remove Trojan-Ransom.Win32.Blocker.lehg?

Trojan-Ransom.Win32.Blocker.lehg removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment