Threat Database Trojans Troj/Ransom-KM

Troj/Ransom-KM

By JubileeX in Trojans

Threat Scorecard

Popularity Rank: 9,996
Threat Level: 50 % (Medium)
Infected Computers: 18,598
First Seen: November 26, 2012
Last Seen: January 4, 2026
OS(es) Affected: Windows

Troj/Ransom-KM belongs to a large family of ransomware Trojans that display fake messages from the police. Troj/Ransom-KM has been used in a recent wave of attacks involving hacked websites registered with GoDaddy. These attacks use DNS hacking techniques to force computer users to visit malicious IP addresses. There, a well known exploit kit is used to install malware on the victim's computer, eventually leading to the Troj/Ransom-KM infection, which is the main payload of these attacks. ESG security researchers advise protecting yourself from this attack by making sure that your security software has the latest security updates and that you are using it to protect your computer at all times. While safe browsing techniques will protect computer users from most malware attacks, the Troj/Ransom-KM attack involves hacked legitimate websites, meaning that Troj/Ransom-KM will affect these websites' regular visitors. It is important to note that these attacks are not the responsibility of GoDaddy but of the websites' owners. ESG malware researchers suspect that these websites may have been hacked because of a failure of using adequate passwords and security measures to protect these web pages from intruders.

Ransomware trojans are among the most common kinds of malware infections today. These kinds of attacks will typically involve a Winlocker component and a fake message from the police. The Winlocker component in Troj/Ransom-KM blocks access to the victim's files and operating system. Troj/Ransom-KM basically prevents the victim from using Windows services like the Windows Task Manager or the Windows Registry Editor and freezes the victim's screen on a full-screen ransom message. This message will usually take the form of a bogus notification from the police. The language of the victim's location (this information can be derived from the victim's IP address) will be used to write the message, and it will also include logos and insignias and make reference to that location's police agencies. The message will allege that the PC was related to illegal actions (such as downloading illegal pornography or copyright infringement). Then, Troj/Ransom-KM will demand the payment of a fine, usually the equivalent of $200 USD.

Affected computer users can often recover from a Troj/Ransom-KM infection by using alternative boot methods to gain access to their security software. Although Troj/Ransom-KM blocks access to your files and programs, they are still there; it is only necessary to gain access to them by starting up Windows in a different way (for example, using the command line or an external drive). Once this is done, a fully up-to-date anti-malware solution should be capable of removing Troj/Ransom-KM; in fact, manual removal is not difficult and only requires basic knowledge of the Windows Registry.

Analysis Report

General information

Family Name: PUP.GameHack.HD
Signature status: No Signature

Known Samples

MD5: 7c95992110abc0a16b8fca086ea3c613
SHA1: de48ff9945b38b712707d77bc2abc9dff99dce73
SHA256: 8BAEEFD86AE767DCF699C3EED07C9CF69C6D049B6BC6767A3F2E19BC11FA1A76
File Size: 644.61 KB, 644608 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • imgui
  • No Version Info
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 1,125
Potentially Malicious Blocks: 367
Whitelisted Blocks: 488
Unknown Blocks: 270

Visual Map

? ? 0 ? ? ? ? ? 0 0 0 ? ? ? ? 0 ? ? ? 0 ? ? ? 0 ? 0 0 ? ? ? 0 0 ? 0 0 0 0 0 0 0 0 x ? 0 0 0 0 0 0 0 0 0 0 0 ? ? x x x 0 x 0 0 0 ? 0 x x 0 x 0 0 0 0 0 0 x 0 ? 0 0 0 0 ? 0 ? 0 0 0 0 x x 0 ? ? 0 ? ? ? 0 0 ? 0 0 0 0 ? ? ? ? 0 ? 0 x ? x x ? ? 0 0 x ? 0 ? ? ? x 0 0 x ? ? 0 0 0 0 ? ? ? x 0 0 0 0 ? x ? ? ? ? ? ? x ? ? 0 x 0 0 0 0 0 0 ? ? ? 0 ? ? x x x ? ? 0 0 x ? x ? x ? 0 x ? 0 0 x ? 0 x x ? ? 0 0 x 0 ? x 0 0 0 0 0 0 0 x x x ? ? ? ? 0 0 ? 0 x ? 0 ? x x x x ? x 0 x 0 ? ? ? x ? x ? x 0 0 ? ? x 0 ? 0 ? 0 0 0 0 x x x 0 x 0 0 0 x x 0 0 0 0 0 x 0 0 0 0 ? x x 0 0 0 0 0 0 0 0 0 x 0 x x x x x 0 x x 0 ? 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 ? 0 0 x x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x ? 0 0 0 0 0 x x 0 x 0 x 0 x 0 0 0 0 x 0 0 0 0 ? 0 0 ? x ? ? 0 0 0 0 0 ? 0 0 0 0 0 x x 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? x ? ? 0 0 x ? ? ? 0 0 0 0 x 0 0 0 0 x 0 x 0 x 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 x x ? 0 x 0 0 x x ? ? 0 ? ? ? x 0 0 0 ? ? ? 0 0 ? x 0 ? 0 0 0 0 x 0 0 ? ? 0 ? 0 0 x ? 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 ? ? 0 ? 0 0 ? ? ? x 0 x 0 ? 0 0 ? ? x 0 x 0 0 ? ? ? ? 0 0 0 0 ? x ? ? x x x ? ? ? ? 0 0 ? ? ? ? ? x 0 x ? x 0 x ? x x ? x x ? x x x x x x ? 0 ? x ? x x x x x ? x ? ? 0 0 0 0 0 0 x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 ? 0 0 ? ? ? ? ? ? ? ? ? ? ? x x x x x x x x x x x x x 0 x x x x 0 x x x x x x 0 0 x 0 0 x 0 0 0 0 x 0 0 0 x 1 0 ? 0 0 ? 0 0 x ? ? ? ? ? ? x x ? ? ? ? ? ? ? ? ? ? x x x x x x x x x x x x x 0 0 0 0 0 x x x ? x x x x x ? x x x x x x ? x x x x x x x 0 0 x x x x 0 0 x x ? ? ? ? ? ? ? x ? ? ? ? 0 0 ? ? x 0 x 0 x x x x x x x x x x x x x x x x x 0 x x 0 0 x ? 0 0 x x x 0 0 0 0 x 0 0 x x x x x x x 0 x 0 x x 0 x 0 x ? 0 x 0 0 0 x x ? ? x 0 1 x x x ? x x x x x x x 0 ? x x x x x x x x x x x x x x x 0 0 ? ? 0 0 0 ? x 0 0 x 0 x x x x x x 0 x 1 0 x x x x 0 x x ? 0 x x ? ? x x ? x x x x x x x x x x x x x x x x 0 x x ? x x ? ? x x x 0 x 0 x ? x ? x x ? x x x x ? ? ? x ? 0 x ? x x 0 x ? x ? ? ? x 0 x x 0 x x x x 0 0 0 x x x 0 0 0 0 x x x 0 0 x x x x x 0 0 x x x ? ? ? ? x x x x x 0 x 0 ? x x 0 x x x x x 1 x 1 0 0 0 0 0 0 0 x x 0 1 1 0 0 x 0 x 0 0 0 x 0 ? x x x 0 x x 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Trending

Most Viewed

Loading...