Behavioral task
behavioral1
Sample
d2d8819644577c4ddc13bc12d991643a728a9dfda45fed5fc283ef231bc22981.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
d2d8819644577c4ddc13bc12d991643a728a9dfda45fed5fc283ef231bc22981
-
Size
57KB
-
MD5
5ba8c802d9bb85c06d9d6fb4de40100a
-
SHA1
be997e6483b24ee82d04970e5c2c0ce58f6320ec
-
SHA256
d2d8819644577c4ddc13bc12d991643a728a9dfda45fed5fc283ef231bc22981
-
SHA512
6d2839b944837a91f10109ca8c28275626cfbec62fda3b4630f6a221811b98b23069133875266d08c770519d2374b47a9a203bb18da6b127eee3d967578ea273
-
SSDEEP
768:U0Z3EzEdxXHrPRl+IAiPg2fKoGZpINC8c+3SrDtWtBHhpxMFpCfqUIVA2EFQW8:U05EaLP3zgPjINCZtWnHjxM7UsYFQW8
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
d2d8819644577c4ddc13bc12d991643a728a9dfda45fed5fc283ef231bc22981.dll .js regsvr32 windows x86