Behavioral task
behavioral1
Sample
694aec58d2f5d75fd20aa7b2b1076d188b9b43cfaf2daa9736d6438f24c2e789.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
694aec58d2f5d75fd20aa7b2b1076d188b9b43cfaf2daa9736d6438f24c2e789
-
Size
41KB
-
MD5
70a1869b55fa96130e764fa07fef30f0
-
SHA1
ff318d6d75677f976cb24edc55cdd3f0121a3e81
-
SHA256
694aec58d2f5d75fd20aa7b2b1076d188b9b43cfaf2daa9736d6438f24c2e789
-
SHA512
3d321a792488489bb2f3bf5a9e5f1c1f2fe6199dbc25ea3eccc1e929d177407090da0ab2ddae947f68a360ca2e7c245c9551c0a5ea59a9d938aa9c55f91116ba
-
SSDEEP
768:qUZ0wcsPUi/JR84m78VWFGAjffLFtA0X2nDXmVeXc4C:qqcsPUiz84e8s0wbnAhnDWVe
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
694aec58d2f5d75fd20aa7b2b1076d188b9b43cfaf2daa9736d6438f24c2e789.dll .js regsvr32 windows x86