Behavioral task
behavioral1
Sample
4d8bf34714f32ef05e7252505665efd87ab4d842738d834aab522d8b8f4b4993.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4d8bf34714f32ef05e7252505665efd87ab4d842738d834aab522d8b8f4b4993.dll
Resource
win10v2004-20220901-en
General
-
Target
4d8bf34714f32ef05e7252505665efd87ab4d842738d834aab522d8b8f4b4993
-
Size
69KB
-
MD5
80627083da1784f4b5fbc4a584ee1dd9
-
SHA1
770cd356c1fc244dacc4c61b8e46cfd7013a8e60
-
SHA256
4d8bf34714f32ef05e7252505665efd87ab4d842738d834aab522d8b8f4b4993
-
SHA512
9ac5f5b808a49767357d48f67763ab997e6c4817160e9acd594a463346d25cb0af071c3e6c0e4072d01202edfc60f7e2024fcf2740f5d5899f991a7611a541e6
-
SSDEEP
1536:oUUmZ6gSi9/wx9+krA3XYVBAV/qNDuVb16yMNk7oPwhkLagPt:o2gg8E53IHS2DsboyMNk7Ewhiagl
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
4d8bf34714f32ef05e7252505665efd87ab4d842738d834aab522d8b8f4b4993.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ