Behavioral task
behavioral1
Sample
e3c016cdf39aa6624a38a7f4b7e96074629870a779eba39f40ac18bc9394fb0d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e3c016cdf39aa6624a38a7f4b7e96074629870a779eba39f40ac18bc9394fb0d.dll
Resource
win10v2004-20220901-en
General
-
Target
e3c016cdf39aa6624a38a7f4b7e96074629870a779eba39f40ac18bc9394fb0d
-
Size
275KB
-
MD5
840dac801ddf851773d3e8a9b3e835d0
-
SHA1
909cf5f66a0ed6dbb451421fb1cbb709ce1e99f2
-
SHA256
e3c016cdf39aa6624a38a7f4b7e96074629870a779eba39f40ac18bc9394fb0d
-
SHA512
80131ba82743026e41b89d96982de757ace1f5840b75ee8ca21abe4dea690bf854ad5ec603bb2bcf10cc6602884db567b72075fdb8f6b4031275ecb6381ba4cb
-
SSDEEP
6144:GCU2+em3jwW0Xk4steC5jYRyzSF4Q6LfSxP87e4bK7hy:62dm3M5kDtrkRML6xU7e4bKQ
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
e3c016cdf39aa6624a38a7f4b7e96074629870a779eba39f40ac18bc9394fb0d.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 808KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 269KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE