Behavioral task
behavioral1
Sample
a76a55dbc48c3a5bfe5b65e3fee8e20314368bbf49cbe573438a6d0608cd7617.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a76a55dbc48c3a5bfe5b65e3fee8e20314368bbf49cbe573438a6d0608cd7617.dll
Resource
win10v2004-20220812-en
General
-
Target
a76a55dbc48c3a5bfe5b65e3fee8e20314368bbf49cbe573438a6d0608cd7617
-
Size
272KB
-
MD5
9215a62b80c7196b77d375d9c53e76f0
-
SHA1
dc7baa00449375d89f20b7c5d3dc2fd973d38b12
-
SHA256
a76a55dbc48c3a5bfe5b65e3fee8e20314368bbf49cbe573438a6d0608cd7617
-
SHA512
309059d664ab2386b59fa7cc550bcefc0dc1466d34411db9555afcf25ae0db24acaab6dd4b782e67bdd3e02256f7b42ab87aaccaa8c48c2cfb5199f89cebe97f
-
SSDEEP
6144:gljE/oahrgJZ6xmzY4I1rQgQ97xaKpOt/j3YdD8:gljEwyrfOY91RQ9NlSj3Ydw
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
a76a55dbc48c3a5bfe5b65e3fee8e20314368bbf49cbe573438a6d0608cd7617.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 800KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 266KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE