Behavioral task
behavioral1
Sample
2ee5eb637905ac8f025bf9e11ff19ad83b14aabe4358f97192999b2d690052a5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2ee5eb637905ac8f025bf9e11ff19ad83b14aabe4358f97192999b2d690052a5.exe
Resource
win10v2004-20220901-en
General
-
Target
2ee5eb637905ac8f025bf9e11ff19ad83b14aabe4358f97192999b2d690052a5
-
Size
197KB
-
MD5
6ef3df4ea603adb101dcf7886b6ebb8d
-
SHA1
13ff42025a29a3c9774d3494c567cf2a77de2bde
-
SHA256
2ee5eb637905ac8f025bf9e11ff19ad83b14aabe4358f97192999b2d690052a5
-
SHA512
eefd031a09d9428d60aa2db704371d0f26bb72d9301938d55f2fa55c99d905fb70a0ebebc440ef568f477b8f463925139f2b7105d206f66d3ecd0406f3ce648a
-
SSDEEP
3072:8UCBpx2MNnL4G3lA/SGlD8iql08tvnkdDQRtAGGnjnhrw3dHnLloFEncLEFWVtOJ:2FVZ3WKS85PPSnjnhaLGEFWVt6JWs
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
2ee5eb637905ac8f025bf9e11ff19ad83b14aabe4358f97192999b2d690052a5.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 139KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE