Behavioral task
behavioral1
Sample
7bcd639a16c24e73a1764de7ab77d99986a823b0657969067f4e97d6ae827529.dll
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7bcd639a16c24e73a1764de7ab77d99986a823b0657969067f4e97d6ae827529.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
7bcd639a16c24e73a1764de7ab77d99986a823b0657969067f4e97d6ae827529
-
Size
32KB
-
MD5
6f4c27a96bf4f897d75e9e7f502047f3
-
SHA1
445831d317cb3edebce3649efeeb0b23b03a0a71
-
SHA256
7bcd639a16c24e73a1764de7ab77d99986a823b0657969067f4e97d6ae827529
-
SHA512
a7f20c375732f93b2b5b780969013ad0893215d0bc1ecd08b12996fb0f06f95ac743891ba651266489ae166eb51c218dfe605d46be009c55609b98805e00b581
-
SSDEEP
768:QXc/MaoE4Ec5maAVodZ2ubPg7QEuvTq7W0N:WcH4p4aAuP2oEu7qS0
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
7bcd639a16c24e73a1764de7ab77d99986a823b0657969067f4e97d6ae827529.dll .ps1 windows x86