F1122
Static task
static1
Behavioral task
behavioral1
Sample
0f7fdb46303364b6e66ee50e47cd89f970d0d05fa1f79cf9fe527c05dead6a8b.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0f7fdb46303364b6e66ee50e47cd89f970d0d05fa1f79cf9fe527c05dead6a8b.dll
Resource
win10v2004-20220414-en
General
-
Target
0f7fdb46303364b6e66ee50e47cd89f970d0d05fa1f79cf9fe527c05dead6a8b
-
Size
199KB
-
MD5
aeb2b379753f4e0305fba2df976b4105
-
SHA1
9261c48b17c81ec2c9bb4f35694813336b0d46c7
-
SHA256
0f7fdb46303364b6e66ee50e47cd89f970d0d05fa1f79cf9fe527c05dead6a8b
-
SHA512
66146d82c0f7fd947708fda176f5af397331e39501eb5fd2fa3e4f47adb06fdeeaaba97edc462f9c31303fe1d940478ab9f17ff347a39d356c466336a13b068e
-
SSDEEP
6144:nlhfIUbIEj1cGzFoOnYI7z82LfEOE+WoS0:71BZV7Q7OsoS
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule sample acprotect -
Processes:
resource yara_rule sample upx
Files
-
0f7fdb46303364b6e66ee50e47cd89f970d0d05fa1f79cf9fe527c05dead6a8b.dll windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 188KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 195KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE