Behavioral task
behavioral1
Sample
23893aa8fc8fcc984cf44ed6ce2d8eb10cea5955c62252e2637b6cb955391242.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
23893aa8fc8fcc984cf44ed6ce2d8eb10cea5955c62252e2637b6cb955391242.dll
Resource
win10v2004-20220812-en
General
-
Target
23893aa8fc8fcc984cf44ed6ce2d8eb10cea5955c62252e2637b6cb955391242
-
Size
876KB
-
MD5
6dcd501f961422e12ccc35fa1a7c0d68
-
SHA1
d63eae8b67763ac8e335c1e1736668067702b096
-
SHA256
23893aa8fc8fcc984cf44ed6ce2d8eb10cea5955c62252e2637b6cb955391242
-
SHA512
5643e937fefe3c35ea30a4fa39d84c21a4c98b5aa13e198b29de9876e38c5780f7fc1136ff9b8197c4baec05ed42bb5726b82b424bc5cca4d294f563f63d4c1d
-
SSDEEP
24576:Taok1ziVgwh9SNiOON3Hv5YkM25Zj6Ar/fBw+rkhHO:Taok16gwqUvNXikMajvHB1rI
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
23893aa8fc8fcc984cf44ed6ce2d8eb10cea5955c62252e2637b6cb955391242.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.6MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 871KB - Virtual size: 872KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE