Behavioral task
behavioral1
Sample
20ea7fc509240ed9e21a9199bbe4610d29af0278f87d4ffecd0743a0e676a411.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20ea7fc509240ed9e21a9199bbe4610d29af0278f87d4ffecd0743a0e676a411.dll
Resource
win10v2004-20220901-en
General
-
Target
20ea7fc509240ed9e21a9199bbe4610d29af0278f87d4ffecd0743a0e676a411
-
Size
643KB
-
MD5
92309ce4b2736065da09b810ddec8970
-
SHA1
4b6f181140a06deb90d54ce2323cf9aa16b3af8b
-
SHA256
20ea7fc509240ed9e21a9199bbe4610d29af0278f87d4ffecd0743a0e676a411
-
SHA512
711f566599b3df835b86e8b9654e553a3ff1277482a5dbda64e6c93e745ff7c81273aa8f33608989aa6afc15889038abcaa36e8d7f43d927ad244552973dafca
-
SSDEEP
12288:mM+EkYZdNz+gRBcR2lZe6Gufp7SmndrOT89zGp35LGWnfd:pPkyphTccK/Sp7Hd7zG7Hnl
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
20ea7fc509240ed9e21a9199bbe4610d29af0278f87d4ffecd0743a0e676a411.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 638KB - Virtual size: 640KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE