Behavioral task
behavioral1
Sample
9b7ce21500c72fc7503b4f0e96f77aad234afda34e121867a9b4499983b42fa2.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
9b7ce21500c72fc7503b4f0e96f77aad234afda34e121867a9b4499983b42fa2
-
Size
57KB
-
MD5
09c9af0a68881913d5bdbac843666680
-
SHA1
8c3b63fcab89817217ae6e8971fb37a36a1d9221
-
SHA256
9b7ce21500c72fc7503b4f0e96f77aad234afda34e121867a9b4499983b42fa2
-
SHA512
cf23f0dcad61fb4a2a962d048a7c0ba5e41021ce8e955a350fe15b95a5eca7298457d09098bb0b697ac781f3a8fb3481199898ab330883d609baecd5cda59f9a
-
SSDEEP
768:L0Z3EzEdxXHrPRl+IAiPg2fKoGZpINC8c+3SrDtWtBHhpxMFpCfqUIVA2EFQW8:L05EaLP3zgPjINCZtWnHjxM7UsYFQW8
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
9b7ce21500c72fc7503b4f0e96f77aad234afda34e121867a9b4499983b42fa2.dll .js regsvr32 windows x86