Behavioral task
behavioral1
Sample
2d1eca34c12d68b5bcb24211478544f7072dfc148c8d5bf6d0aecc16b463c913.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2d1eca34c12d68b5bcb24211478544f7072dfc148c8d5bf6d0aecc16b463c913.dll
Resource
win10v2004-20220812-en
General
-
Target
2d1eca34c12d68b5bcb24211478544f7072dfc148c8d5bf6d0aecc16b463c913
-
Size
752KB
-
MD5
1bd65436a17d0c8e0bef1c263aac5870
-
SHA1
c652069dfa70bc163b7bd6f4eb5c3a1bf892d7b2
-
SHA256
2d1eca34c12d68b5bcb24211478544f7072dfc148c8d5bf6d0aecc16b463c913
-
SHA512
452a176d427701fd81301caeafac5dca0e837c1f87df100e12076cef682492d13173f3d469d89ec5dfb9613526520de6009d76b3abe0c3abd7656bbddd9e4f1c
-
SSDEEP
12288:/fbIOghkbTadkA9YAw0clBaHECA4x+qOaLytYbxfqXUFRWKfjxMBqKN432ybYWE0:/fmhkbTenCAw0aoHECz5pLywjf/7xEXi
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
2d1eca34c12d68b5bcb24211478544f7072dfc148c8d5bf6d0aecc16b463c913.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 746KB - Virtual size: 748KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE