Behavioral task
behavioral1
Sample
c5dd2ccbb775cd936d0ca0c8563e4188813730db632c23d78f853dded1043f9a.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
c5dd2ccbb775cd936d0ca0c8563e4188813730db632c23d78f853dded1043f9a
-
Size
41KB
-
MD5
687f4720d89d8857cc259bfcc32fbd63
-
SHA1
da65c6c25e4c078139bbd20844fe32bd95742ecc
-
SHA256
c5dd2ccbb775cd936d0ca0c8563e4188813730db632c23d78f853dded1043f9a
-
SHA512
a19e351260dfcb069a4886046280eb5c7cce013244c0d615076c7cb3b842d734f714496752b65de826dd79c3df6dc1b56d147600e50b038b86bd7abceeed7107
-
SSDEEP
768:DUZ0wcsPUi/JR84m78VWFGAjffLFSsPtZaD6RKsUhlHbxYiONiWi:DqcsPUiz84e8s0wbJvfKsUzx+i
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
c5dd2ccbb775cd936d0ca0c8563e4188813730db632c23d78f853dded1043f9a.dll .js regsvr32 windows x86