user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Ransom:Win32/DragonForce.D
Ransom:Win32/DragonForce.D - Windows Defender threat signature analysis

Ransom:Win32/DragonForce.D - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Ransom:Win32/DragonForce.D
Classification:
Type:Ransom
Platform:Win32
Family:DragonForce
Detection Type:Concrete
Known malware family with identified signatures
Variant:D
Specific signature variant within the malware family
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Ransomware - Encrypts files and demands payment for 32-bit Windows platform, family DragonForce

VDM Static Detection:
Relevant strings associated with this threat:
 - UMD<4 (SNID)
 - (p7DW1 (SNID)
 - |#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID)
 - }#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID)
 - &|#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID)
 - &}#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID)
 - C|#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID)
 - C}#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID)
 - |#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID)
 - }#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID)
 - |#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID)
 - }#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID)
 - |#d3e037e1-3eb8-44c8-a917-57927947596d (NID)
 - }#d3e037e1-3eb8-44c8-a917-57927947596d (NID)
 - |#92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b (NID)
 - }#92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b (NID)
 - |#c1db55ab-c21a-4637-bb3f-a12568109d35 (NID)
 - }#c1db55ab-c21a-4637-bb3f-a12568109d35 (NID)
 - |#26190899-1602-49e8-8b27-eb1d0a1ce869 (NID)
 - }#26190899-1602-49e8-8b27-eb1d0a1ce869 (NID)
 - |#e6db77e5-3df2-4cf1-b95a-636979351e5b (NID)
 - }#e6db77e5-3df2-4cf1-b95a-636979351e5b (NID)
Known malware which is associated with this threat:
Filename: 7c67ac6140a6bcf8774be0365cbe8fe10e0bf0cf2918bd734ee4aca77de48c7a.bin
7c67ac6140a6bcf8774be0365cbe8fe10e0bf0cf2918bd734ee4aca77de48c7a
22/01/2026
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 22/01/2026. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$