Behavioral task
behavioral1
Sample
367dbecafab0c83a1ad204ef4637ed19323e97e4d9ef39b6c8b663bd84c4f546.dll
Resource
win7-20220901-en
4 signatures
150 seconds
General
-
Target
367dbecafab0c83a1ad204ef4637ed19323e97e4d9ef39b6c8b663bd84c4f546
-
Size
41KB
-
MD5
57ef5e9dddac0949402d23815f3adfb3
-
SHA1
5f187ace43693ce5f243840c5b1e447681e8a3f0
-
SHA256
367dbecafab0c83a1ad204ef4637ed19323e97e4d9ef39b6c8b663bd84c4f546
-
SHA512
c229b49c15f628fb1275c1cb83186cbd05f26df7fb18b666776c39e58ccd1bd6c01ce842c363878232411bf49c715c245c7e557081cf462e20c2777a6e4ea736
-
SSDEEP
768:xOAFFs0cGeCUAHs4ISSSUpKxg3RmLp8Lmx251GLuPdGPYi+eaQF:xts4F5Sg8Lmxs0LuGPla
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
367dbecafab0c83a1ad204ef4637ed19323e97e4d9ef39b6c8b663bd84c4f546.dll .js regsvr32 windows x86