Behavioral task
behavioral1
Sample
1b3cc4afcf91167350acb9d295096e0c4c3b76f90e3ef44ebeeed3c386fd4cf3.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
1b3cc4afcf91167350acb9d295096e0c4c3b76f90e3ef44ebeeed3c386fd4cf3
-
Size
41KB
-
MD5
69ffaa90e3a1ce7be95ee196f6573bf0
-
SHA1
850a9a3a6bb8bc5ba88cb7b8e20ddecd6c7be56f
-
SHA256
1b3cc4afcf91167350acb9d295096e0c4c3b76f90e3ef44ebeeed3c386fd4cf3
-
SHA512
c82294454a3745f68afc7c01fd8207ed9628d9f0ab1c52ee187483c86301fe86600f517576228c18a34203c5464047027182ff496aa5a0f51915c8675f447d7f
-
SSDEEP
768:1OAFFs0cGeCUAHs4ISSSUpKxg3RmLp8Lmx251GLuPdGPYi+eaQF:1ts4F5Sg8Lmxs0LuGPla
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
1b3cc4afcf91167350acb9d295096e0c4c3b76f90e3ef44ebeeed3c386fd4cf3.dll .js regsvr32 windows x86