Behavioral task
behavioral1
Sample
bffe854d442aac9148f7bdafa9996804ac38ec620e93a9dd37b3282342f5e9d1.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
bffe854d442aac9148f7bdafa9996804ac38ec620e93a9dd37b3282342f5e9d1
-
Size
41KB
-
MD5
702d241a773aff02cc045124651e276f
-
SHA1
97b7f6ae0ee3a2eff43f797220929fa1fa238779
-
SHA256
bffe854d442aac9148f7bdafa9996804ac38ec620e93a9dd37b3282342f5e9d1
-
SHA512
9fa81e9d9fd3e0d9edb44f950231ff177aad9a79ded710c3992c99004547a7d9582d911a292e524f9c3a64a428c87ec6890a5e695ffa5f1052454c14f940d091
-
SSDEEP
768:bOAFFs0cGeCUAHs4ISSSUpKxg3RmLp8Lmx251GLuPdGPYi+eaQF:bts4F5Sg8Lmxs0LuGPla
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
bffe854d442aac9148f7bdafa9996804ac38ec620e93a9dd37b3282342f5e9d1.dll .js regsvr32 windows x86