Behavioral task
behavioral1
Sample
ca81853efecd0359292f8dd414d39ac526de6a7cd990b43eac1287065bfdacfc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca81853efecd0359292f8dd414d39ac526de6a7cd990b43eac1287065bfdacfc.dll
Resource
win10v2004-20220812-en
General
-
Target
ca81853efecd0359292f8dd414d39ac526de6a7cd990b43eac1287065bfdacfc
-
Size
278KB
-
MD5
c6ac30ca9e815997d2d25b26df368a39
-
SHA1
d362915a5629fe1b832e851523bb900351962b20
-
SHA256
ca81853efecd0359292f8dd414d39ac526de6a7cd990b43eac1287065bfdacfc
-
SHA512
d98a23d8a64b1fa79d2931152ec5c79cf3d57b00f5f05ce746c5789364d89ba59a390ebafcb023c2154045118d5388950ced119774c226f462ba7924084cc000
-
SSDEEP
6144:c6qJspy1jJibwefXSpM8iM4FihbWjRY6/r/qgQSa1vpKy8Ovfk41Fgt5UqxmgSHx:2y1vSXd4MJWl7qgQI8M41Fqjx1SHoSD
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
ca81853efecd0359292f8dd414d39ac526de6a7cd990b43eac1287065bfdacfc.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 360KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 276KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE