Behavioral task
behavioral1
Sample
2f85297926413e385e3f221e32e9ce9153b6e671d8a0c51d27c4badcf3341adb.dll
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2f85297926413e385e3f221e32e9ce9153b6e671d8a0c51d27c4badcf3341adb.dll
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
2f85297926413e385e3f221e32e9ce9153b6e671d8a0c51d27c4badcf3341adb
-
Size
32KB
-
MD5
344629d370cc31424c013ac193b5c0a4
-
SHA1
34641fab601c2267d727c4aa67ac26257dd20ebb
-
SHA256
2f85297926413e385e3f221e32e9ce9153b6e671d8a0c51d27c4badcf3341adb
-
SHA512
6d48957628aa79c45283afd4b2f14adf9baba1cb25e5d884d0a56ef3e0654c92b9ca58ababe6e62390f8815638111594ee2466439d44074d8bfac51fc0298c3b
-
SSDEEP
768:QXc/MaoE4Ec5maAVodZ2ubPg7QEuvTq7W0N:WcH4p4aAuP2oEu7qS0
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
2f85297926413e385e3f221e32e9ce9153b6e671d8a0c51d27c4badcf3341adb.dll .ps1 windows x86