___CPPdebugHook
Behavioral task
behavioral1
Sample
dab5de4a9d8e994d6faa91693ced4988c65b1c00cfdebfd7788ea99bc4f273aa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dab5de4a9d8e994d6faa91693ced4988c65b1c00cfdebfd7788ea99bc4f273aa.dll
Resource
win10v2004-20220812-en
General
-
Target
dab5de4a9d8e994d6faa91693ced4988c65b1c00cfdebfd7788ea99bc4f273aa
-
Size
249KB
-
MD5
743012e110077abbf0baa44c78a8d8ce
-
SHA1
94802f71f8eb3ac7e2fc7b6d17dd8ebf3bb32251
-
SHA256
dab5de4a9d8e994d6faa91693ced4988c65b1c00cfdebfd7788ea99bc4f273aa
-
SHA512
c3ee4d62a15b8ac84666a9b6fabc82b7ec7d6de81ef95b7946ef6f65c2743bba755ac52c05824ea603b1125516bea7d6b30962fbe66cff527b49cf438a7dc902
-
SSDEEP
6144:xq1LLJh8G4Ztffoycg8bQoRhYTXnyO3Qz/2yczRmzDOh:xq1fJuBZFCp8z/3Q/lrzCh
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
dab5de4a9d8e994d6faa91693ced4988c65b1c00cfdebfd7788ea99bc4f273aa.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 460KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 246KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE