Behavioral task
behavioral1
Sample
6fbc85f1213b3bac0c5a2176ef7b2e4a587f0d12a670042a1587e734039cd79d.dll
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
6fbc85f1213b3bac0c5a2176ef7b2e4a587f0d12a670042a1587e734039cd79d
-
Size
41KB
-
MD5
91b2f568c08761452459f3c980ca225b
-
SHA1
5502c0ab837cd5efb0702e5257b82f395384deac
-
SHA256
6fbc85f1213b3bac0c5a2176ef7b2e4a587f0d12a670042a1587e734039cd79d
-
SHA512
35d536bd27fa243836465685d339b775ac80e1760358027c42d6d848a52e69c088a88c471570792eed853d3d2af8f15a4977c3a5003722026ca6284748952936
-
SSDEEP
768:BOAFFs0cGeCUAHs4ISSSUpKxg3RmLp8Lmx8LcSjwWJzhAaLEl:Bts4F5Sg8LmxAF7Jl/
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
6fbc85f1213b3bac0c5a2176ef7b2e4a587f0d12a670042a1587e734039cd79d.dll .js regsvr32 windows x86