Static task
static1
Behavioral task
behavioral1
Sample
4b8d42682307181d174308c2b472e1f2_virlock_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4b8d42682307181d174308c2b472e1f2_virlock_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
4b8d42682307181d174308c2b472e1f2_virlock_JC.exe
-
Size
2.2MB
-
MD5
4b8d42682307181d174308c2b472e1f2
-
SHA1
e1518d8e5e604c515178846e7d37ca6783eecedb
-
SHA256
320ae8c676ee2ca7ffb58e97ece9e8f5bce37d1701dc5e7d81faa44adac096d4
-
SHA512
4749d8e35d82c001aa897e8d3873f739a906bfa9d5803d325d3afdd839590f2e6862115a1ac5d5b05e0334d0ddfd76da7282f3e055f348e238d0d234bcd2f9d0
-
SSDEEP
49152:5No47ZbB4g2I5cRx/j6LlBoUAMf8ILxWTLUj8OJyz9ArDVbLBtyPJ5S+4F8UH:nX3c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b8d42682307181d174308c2b472e1f2_virlock_JC.exe
Files
-
4b8d42682307181d174308c2b472e1f2_virlock_JC.exe.exe windows x86
91c4ef4012e1a01e0fab9d9e877357ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
user32
GetClipboardViewer
GetKBCodePage
Sections
.text Size: 888KB - Virtual size: 888KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE