Behavioral task
behavioral1
Sample
3a5610cf590ddf85d009502c3f326954603982ba8194fd005ca225bda3312af3.dll
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a5610cf590ddf85d009502c3f326954603982ba8194fd005ca225bda3312af3.dll
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
3a5610cf590ddf85d009502c3f326954603982ba8194fd005ca225bda3312af3
-
Size
32KB
-
MD5
0c073fd5845933f5042c2ce8ed38d4eb
-
SHA1
1c90bbc74bb9e9b067c76e64b73feb5bdd245c4d
-
SHA256
3a5610cf590ddf85d009502c3f326954603982ba8194fd005ca225bda3312af3
-
SHA512
5bb039b14752dfb3b64f5adaa54c2eeb4e710bc0d58433496a81f448cc5a9e4b3338137602098224ab5f341c111a4fae4ce611ae2273c689c31989f405eb2ea6
-
SSDEEP
768:QXc/MaoE4Ec5maAVodZ2ubPg7QEuvTq7W0N:WcH4p4aAuP2oEu7qS0
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
3a5610cf590ddf85d009502c3f326954603982ba8194fd005ca225bda3312af3.dll .ps1 windows x86