Behavioral task
behavioral1
Sample
8640ea59b69af9099036bb2f3686bcb6d8cd0c5f373c9050ea484c393bebf522.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
8640ea59b69af9099036bb2f3686bcb6d8cd0c5f373c9050ea484c393bebf522
-
Size
41KB
-
MD5
4fb663f927a7a2a96ef9cad535518b70
-
SHA1
35497b3afe207478d86483fd7a8e708d8e60c837
-
SHA256
8640ea59b69af9099036bb2f3686bcb6d8cd0c5f373c9050ea484c393bebf522
-
SHA512
ac3baeb3c320bbff2f7584d3dc43b25e0615738a58baccaeccfa2e7c722e7863662650b4245a131e04c6e1f013eb94b91e25028a5f92db390aca6c31e2227a1b
-
SSDEEP
768:MOAFFs0cGeCUAHs4ISSSUpKxg3RmLp8LmxoBBP8H6wq35xPF:Mts4F5Sg8LmxovE6f
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
8640ea59b69af9099036bb2f3686bcb6d8cd0c5f373c9050ea484c393bebf522.dll .js regsvr32 windows x86