Behavioral task
behavioral1
Sample
0c404d474f99c4ebf48b1de04dd257e2c89c7743d2da08ed696ff70421c18b9b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c404d474f99c4ebf48b1de04dd257e2c89c7743d2da08ed696ff70421c18b9b.dll
Resource
win10v2004-20220901-en
General
-
Target
0c404d474f99c4ebf48b1de04dd257e2c89c7743d2da08ed696ff70421c18b9b
-
Size
506KB
-
MD5
7990242b3199c9b6d01b2c9b636eab15
-
SHA1
f5e515fbd13eb610fc7be37cfc9ae752754b0411
-
SHA256
0c404d474f99c4ebf48b1de04dd257e2c89c7743d2da08ed696ff70421c18b9b
-
SHA512
c39504d44cc19ff65e4e89e513fe2b5471a9e54a6faaa854f18a0582e8265b553402bdc0be6ae6849fea338ea315a3a3238dee63ab753b272afe065ff71fa89c
-
SSDEEP
12288:0p+fAi6ECaNsWKNRwlmeAr8WnTA/lkLPpTD1PJZv:0pwU5/veArJnTA9Ev1RZv
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
0c404d474f99c4ebf48b1de04dd257e2c89c7743d2da08ed696ff70421c18b9b.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 503KB - Virtual size: 504KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE