Behavioral task
behavioral1
Sample
9862797d53ed6773c1338940035f2bbdde3854634593b3e593d79bda644815bb.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
9862797d53ed6773c1338940035f2bbdde3854634593b3e593d79bda644815bb
-
Size
41KB
-
MD5
527875e47955f71d97193327692fad10
-
SHA1
ba2416473c649801fc88e79e81a1c04050ba2ddf
-
SHA256
9862797d53ed6773c1338940035f2bbdde3854634593b3e593d79bda644815bb
-
SHA512
cb12be9ffacc583cd361c546f532b82345d5f98511d3923d2d753f965ad87f1e0805a91a3475fc91356998a63491067af2cad194b8be1284835768fc9b49558f
-
SSDEEP
768:AOAFFs0cGeCUAHs4ISSSUpKxg3RmLp8LmxoBBP8H6wq35xPF:Ats4F5Sg8LmxovE6f
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
9862797d53ed6773c1338940035f2bbdde3854634593b3e593d79bda644815bb.dll .js regsvr32 windows x86