Behavioral task
behavioral1
Sample
b501fc97cb599aa1e670c8902799bbf96989d109e2ea55cad444e12214801d2b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b501fc97cb599aa1e670c8902799bbf96989d109e2ea55cad444e12214801d2b.dll
Resource
win10v2004-20220812-en
General
-
Target
b501fc97cb599aa1e670c8902799bbf96989d109e2ea55cad444e12214801d2b
-
Size
440KB
-
MD5
71ab7be6c0bab285eabf7603f60f8610
-
SHA1
d59569cd14f181df705c71b2c4b6032451f51e3c
-
SHA256
b501fc97cb599aa1e670c8902799bbf96989d109e2ea55cad444e12214801d2b
-
SHA512
19311c2230e82d2a039f306dd6304d8e96f4f4ca89c250bc7f989db3e104f21bb1d89ab502ae032eae5ae39527d7e5dc898dec08503154a14a03e78d1c5edb7d
-
SSDEEP
6144:z7uOGsfZ4iel4j+SLPvgAAiSi+L634Y1m1JRTRzNVA4OXyF9CTDtP9Um3Ivazgha:3wsfepl2PvgAZ59+BvCT5PiRvMqE+s
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
b501fc97cb599aa1e670c8902799bbf96989d109e2ea55cad444e12214801d2b.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 336KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 438KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll .vbs windows x86