Behavioral task
behavioral1
Sample
38d6f3dae83c7787fc54a4eb7451d38bdf6b8f924530592e684bb3132cdc7d76.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
38d6f3dae83c7787fc54a4eb7451d38bdf6b8f924530592e684bb3132cdc7d76
-
Size
41KB
-
MD5
a24e5edde0fb54823b09bb85ef709820
-
SHA1
7d905aa8ff8c301257b7e9ddcb24bfbc208d4fcb
-
SHA256
38d6f3dae83c7787fc54a4eb7451d38bdf6b8f924530592e684bb3132cdc7d76
-
SHA512
a843567bc78c4b70be382a2723b3128bd98d3ee7edffa17123989199b696b0745ca0de8897356b1c6b1530c0271bd21ccdb6b65264bc6449ff1ea77ce4d933fc
-
SSDEEP
768:qOAFFs0cGeCUAHs4ISSSUpKxg3RmLp8Lmxm27cz1GLuPdGVYi+eacl:qts4F5Sg8Lmxm27o0LuGVla
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
38d6f3dae83c7787fc54a4eb7451d38bdf6b8f924530592e684bb3132cdc7d76.dll .js regsvr32 windows x86