Behavioral task
behavioral1
Sample
5ee964d576cbbf33db53128643a5d8341a3e7a74385cf8a9f21d9dd3bc926d3d.dll
Resource
win7-20220812-en
General
-
Target
5ee964d576cbbf33db53128643a5d8341a3e7a74385cf8a9f21d9dd3bc926d3d
-
Size
157KB
-
MD5
0a37989b3b99cc4078d40d950fa84aa3
-
SHA1
0613f353ef5daf46aaa5f07dded63befa3d73bbd
-
SHA256
5ee964d576cbbf33db53128643a5d8341a3e7a74385cf8a9f21d9dd3bc926d3d
-
SHA512
cf7f58a8d5bfc619d031c9f79fafd1b6c3c0fcbc1ee508db3bedb3d0f8c6ab71febdd36997a7206011114745ea15632e2e870fd49518c28236c7bfabaf5affbd
-
SSDEEP
3072:IAHLu3xa0v0a6YDoB1x8wadl5afuKj7s8pr21GJYm6g4C:ry3Q0v0a3ac5+3pK1GC/i
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
5ee964d576cbbf33db53128643a5d8341a3e7a74385cf8a9f21d9dd3bc926d3d.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ