___CPPdebugHook
Behavioral task
behavioral1
Sample
52b1a63224249d51e6dd9a6a1fc1d833d34130e7fc26d89180e78083ac0aadff.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
52b1a63224249d51e6dd9a6a1fc1d833d34130e7fc26d89180e78083ac0aadff.dll
Resource
win10v2004-20220812-en
General
-
Target
52b1a63224249d51e6dd9a6a1fc1d833d34130e7fc26d89180e78083ac0aadff
-
Size
829KB
-
MD5
384f21ba1435044eeef226ba63cce3e2
-
SHA1
dfcb417543998807868e6836dbe1bad78a94df8d
-
SHA256
52b1a63224249d51e6dd9a6a1fc1d833d34130e7fc26d89180e78083ac0aadff
-
SHA512
11d8982e59018ce886154f39713fad075bb17b2d54a0154438c0169f9cd0ab5a61fc8c338bc0dc21ac0586018cefbf44fb81634c999bdf6d5d48cdb31ec8f877
-
SSDEEP
6144:xq1LLJh8G4Ztffoycg8bQoRhYTXnyO3Qz/2yczRmzDO71dsmJ45f7m95v7oG2bz1:xq1fJuBZFCp8z/3Q/lrzCU85T5wVB
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
52b1a63224249d51e6dd9a6a1fc1d833d34130e7fc26d89180e78083ac0aadff.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 460KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 246KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE