Behavioral task
behavioral1
Sample
8c3ac206e7bcdabe8a409ce92c774129bf88b37ba93c6085f895d9e395da9d90.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8c3ac206e7bcdabe8a409ce92c774129bf88b37ba93c6085f895d9e395da9d90.dll
Resource
win10v2004-20220812-en
General
-
Target
8c3ac206e7bcdabe8a409ce92c774129bf88b37ba93c6085f895d9e395da9d90
-
Size
6KB
-
MD5
fc42aab27413a6941efef34fe53a5c35
-
SHA1
858193205e15617208f8a2d3fd204906c12ffb6c
-
SHA256
8c3ac206e7bcdabe8a409ce92c774129bf88b37ba93c6085f895d9e395da9d90
-
SHA512
727c1187b815836dcf7a73e72f0b3d31e3786ee712a11f394e85eb1825a6a5399aa699981cb1cde4d76569b4477562494c47d642ee0cadc02b6a6836f996ef0a
-
SSDEEP
96:cTrre/xLXyvnu1rqCFWh/nWFnfIEO73wM19YdoO7+60iZ5X:cTP89Xyvu12CFugcioKX
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
8c3ac206e7bcdabe8a409ce92c774129bf88b37ba93c6085f895d9e395da9d90.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 802B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ