Behavioral task
behavioral1
Sample
cff696e450920e39307512a8e6173c8b277f80b30ff747376e492f415c978a18.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cff696e450920e39307512a8e6173c8b277f80b30ff747376e492f415c978a18.dll
Resource
win10v2004-20220901-en
General
-
Target
cff696e450920e39307512a8e6173c8b277f80b30ff747376e492f415c978a18
-
Size
275KB
-
MD5
a12543113fec341b2d504f848e6a5349
-
SHA1
2d51eb7a0f87fb4d592006b871a547025f67a441
-
SHA256
cff696e450920e39307512a8e6173c8b277f80b30ff747376e492f415c978a18
-
SHA512
d212dd2676faa3989118b7bc3544b0c768dd924cf9d4930d8ececd9db074fe41ef76e37f5c109f625b8ff6a33c2786a18c277c54b59eaae05581fcd538cfe44c
-
SSDEEP
6144:AUP7k9o0KwgfxQirwTpyWs1BY7DWFymUz3QLgbRnyJdoS1:AzG0ifM9I1BY2Fyvu0nKdoS1
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
cff696e450920e39307512a8e6173c8b277f80b30ff747376e492f415c978a18.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 364KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 273KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE