Behavioral task
behavioral1
Sample
768a9a1aed6d02e7e86df66adb779b78a10753ebc8900232504e42fd2ee75400.dll
Resource
win7-20220901-en
4 signatures
150 seconds
General
-
Target
768a9a1aed6d02e7e86df66adb779b78a10753ebc8900232504e42fd2ee75400
-
Size
41KB
-
MD5
544ed94089ec92e8c962332451101f10
-
SHA1
475021690602e0d2462b370bb442394532b6c504
-
SHA256
768a9a1aed6d02e7e86df66adb779b78a10753ebc8900232504e42fd2ee75400
-
SHA512
6be20805f76acd42ffe5e148fbdc91a56fb6b670351b8cec333f1b0c1624a4fd2365b3b4f13ea5d23a64ce11844bea3234dc8e9d0cf1a5670e0813b961392894
-
SSDEEP
768:UOAFFs0cGeCUAHs4ISSSUpKxg3RmLp8Lmx251GLuPdGPYi+eaQF:Uts4F5Sg8Lmxs0LuGPla
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
768a9a1aed6d02e7e86df66adb779b78a10753ebc8900232504e42fd2ee75400.dll .js regsvr32 windows x86