Behavioral task
behavioral1
Sample
88de4f5c57210c3419d67bb14b01a4bb6f3b1ce89d44108642afe27e2de9b92a.dll
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
88de4f5c57210c3419d67bb14b01a4bb6f3b1ce89d44108642afe27e2de9b92a.dll
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
88de4f5c57210c3419d67bb14b01a4bb6f3b1ce89d44108642afe27e2de9b92a
-
Size
32KB
-
MD5
a19032efe9ae25dc74ec46a0834facf1
-
SHA1
4a5eb361b1839ebf3de89da03ef4dc4c902389d0
-
SHA256
88de4f5c57210c3419d67bb14b01a4bb6f3b1ce89d44108642afe27e2de9b92a
-
SHA512
08abc52619f13bbeff6c1cb4d6b98328d14bd18bb4ee258037880c26bcf1daeec716183ab783e07aecbf5db32d7c98c18d5fba88efe776ea7080bd2aebcbc461
-
SSDEEP
768:QXc/MaoE4Ec5maAVodZ2ubPg7QEuvTq7W0N:WcH4p4aAuP2oEu7qS0
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
88de4f5c57210c3419d67bb14b01a4bb6f3b1ce89d44108642afe27e2de9b92a.dll .ps1 windows x86