___CPPdebugHook
Behavioral task
behavioral1
Sample
302b01b996761a621babafe5f030acdce7ae1590fb1ee117de81460b2aad91a9.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
302b01b996761a621babafe5f030acdce7ae1590fb1ee117de81460b2aad91a9.dll
Resource
win10v2004-20220812-en
General
-
Target
302b01b996761a621babafe5f030acdce7ae1590fb1ee117de81460b2aad91a9
-
Size
215KB
-
MD5
7b2ece8298bc92ac5e9cca3d6b616a70
-
SHA1
395e7bf722c056706a590c46430d86f11efc3e8c
-
SHA256
302b01b996761a621babafe5f030acdce7ae1590fb1ee117de81460b2aad91a9
-
SHA512
2e26b4769500d1e7cb8d1ef37be74dcc1e1d2478da384d2d1c98aeaf4abd0c801e6b50f197d103446ead1562a339eb1391b18121d4ad0a7ff8c4381c9c683aed
-
SSDEEP
6144:vlK7BXzHgjDRT4wVuK11sFEwBpkLSm+luSk6XqLb+KV/YF+O:vUSjD/uK11g9kF/6XqLb+KdYP
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
302b01b996761a621babafe5f030acdce7ae1590fb1ee117de81460b2aad91a9.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 328KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 212KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE