Behavioral task
behavioral1
Sample
f07a7333b4253816a5423d10e57a9a3260def7cbd07afc31b2f76994e1374567.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
f07a7333b4253816a5423d10e57a9a3260def7cbd07afc31b2f76994e1374567
-
Size
41KB
-
MD5
7197f3f95b17c4d20dacef46120cab80
-
SHA1
4dafecffeec284b64f6dac4e1db7f0629632a886
-
SHA256
f07a7333b4253816a5423d10e57a9a3260def7cbd07afc31b2f76994e1374567
-
SHA512
009bdf71563b6b4b7675425d3f188d51322a0e391eb910d8e10be14dbc58d2c539a718fda7acbeab157e0ec64a4ee2efbecefe3476eaa3900fea297f24c5f96b
-
SSDEEP
768:WOAFFs0cGeCUAHs4ISSSUpKxg3RmLp8LmxoBBP8H6wq35xPF:Wts4F5Sg8LmxovE6f
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
f07a7333b4253816a5423d10e57a9a3260def7cbd07afc31b2f76994e1374567.dll .js regsvr32 windows x86