Threat Database Ransomware Maoloa.A Ransomware

Maoloa.A Ransomware

By CagedTech in Ransomware

Threat Scorecard

Popularity Rank: 22,535
Threat Level: 100 % (High)
Infected Computers: 58
First Seen: July 4, 2019
Last Seen: November 2, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Maoloa.A Ransomware
Signature status: No Signature

Known Samples

MD5: ffe0eb31e264319a1871d33af4c4abbf
SHA1: 7f1c54c1714572842ad8c7174bd994bd9ac6403a
SHA256: 6563E8AA156A255B6DE6E07130DEDF65A495CB1CFBAB300EDBBEE874FB808E4B
File Size: 491.01 KB, 491008 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Company Name Zhuhai Kingsoft Office Software Co.,Ltd
File Description WPS Office Expansion tool
File Version 12.1.0.16412
Internal Name ksolite.dll
Legal Copyright Copyright©2024 Kingsoft Corporation. All rights reserved.
Original Filename ksolite.dll
Product Name WPS Office
Product Version 12.1.0.16412

File Traits

  • dll
  • HighEntropy
  • ntdll
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 1,301
Potentially Malicious Blocks: 280
Whitelisted Blocks: 819
Unknown Blocks: 202

Visual Map

? ? ? 0 ? ? ? ? ? 0 ? ? ? x x x 0 0 ? x x x ? ? ? ? 0 0 x x 0 0 ? 0 ? ? 0 ? x 0 ? x ? ? ? ? 0 x ? ? x 0 ? x x ? ? ? ? x 0 x x x ? x ? x ? x x x x x 0 x x 0 x 0 0 0 ? x ? ? ? ? x ? ? x x 0 0 x x x x x x x x x ? ? x ? x ? x 0 0 0 0 0 0 x x x ? ? ? ? ? ? x x x x ? ? 0 0 0 0 x x ? ? 0 ? x x ? ? x ? x x x ? 0 x x x 0 0 0 ? ? x ? ? 0 0 ? ? x x x x 0 x x x x ? 0 0 x ? x x x x 0 x x 0 x x x 0 x x x 0 x ? 0 x 0 0 x 0 x x ? x ? ? ? ? x x x x x x 0 x 0 0 ? ? x 0 x x x x 0 x x x 0 0 x x ? x ? ? ? ? ? ? ? 0 ? 0 ? 0 ? ? ? x x x 0 0 x x x x 0 x x 0 x x 0 0 ? x x 0 x ? x x 0 x ? ? 0 ? 0 x ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 0 x ? 0 ? ? ? ? x x ? ? ? x x 0 0 x ? ? ? ? ? ? ? x ? ? ? x ? 0 0 0 0 0 0 x x x ? ? x x ? x x ? x ? ? ? ? 0 ? x ? ? ? ? x ? x ? x ? ? ? ? ? ? x 0 0 0 x 0 x ? ? x x 0 ? 0 x ? 0 x 0 0 ? x x ? 0 0 0 0 0 0 0 0 0 x 0 x ? x x ? ? ? ? ? ? x x 0 0 0 0 0 0 0 ? 0 0 x x ? 0 x ? ? ? x x 0 0 0 0 x 0 x x x x x x 0 ? 0 ? 0 x x x x x x x x x x x x 0 0 x x x 0 0 1 0 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 x 0 0 1 0 x 0 0 1 x 0 0 1 0 x x x 0 0 0 0 0 x x 0 x x ? ? ? x x 0 x x x x x x 0 x x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x x x 0 0 0 0 x x x 0 0 0 0 x x 0 x x x x x x x x x ? x 0 x ? ? ? ? 0 0 x 0 0 0 0 0 0 0 x 0 0 x 0 0 0 0 1 ? ? x x 0 0 0 ? 0 0 0 0 0 x 0 x x ? x ? 0 ? ? ? ? 0 ? 0 ? ? x ? ? ? x 0 x x x 0 ? 0 x x x 0 x x x x x x x ? x ? x x x x x x x x x 0 ? x x x x x ? ? ? x x x x x ? ? ? x ? ? x x x x 0 x 2 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 2 0 2 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 0 3 1 1 0 1 0 1 2 0 0 1 0 0 1 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\7f1c54c1714572842ad8c7174bd994bd9ac6403a_0000491008.,LiQMAxHB

Trending

Most Viewed

Loading...