Behavioral task
behavioral1
Sample
246cfe5e4d6d9c0aad7897685cbe1c026165a6e1e6f61ad1bb4c76a297287e5f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
246cfe5e4d6d9c0aad7897685cbe1c026165a6e1e6f61ad1bb4c76a297287e5f.dll
Resource
win10v2004-20220812-en
General
-
Target
246cfe5e4d6d9c0aad7897685cbe1c026165a6e1e6f61ad1bb4c76a297287e5f
-
Size
41KB
-
MD5
524f95d4440ed3badaa0adcdc96f8440
-
SHA1
10a1ed285ffe268ada3d4778bae826f7dc0433c6
-
SHA256
246cfe5e4d6d9c0aad7897685cbe1c026165a6e1e6f61ad1bb4c76a297287e5f
-
SHA512
531d5dcdd256f883b558422d0eefe0a823e92afe6f44ecba5b70155b59d42f627fe3c16ab1a37b7e5d42be53b212567eebb87b0333fec3c96bbde8788f002d51
-
SSDEEP
768:2NhKyV/trVltPdxkJcKVJAMgul48wHxnlClYo5d/9RwNxV/:x61rVXkJ7JAMp48wH8hDlS/V/
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
246cfe5e4d6d9c0aad7897685cbe1c026165a6e1e6f61ad1bb4c76a297287e5f.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ