Behavioral task
behavioral1
Sample
b8c17448a31b4bdda8ac464cab36179547f465a83a235411d7d90da0351901b9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8c17448a31b4bdda8ac464cab36179547f465a83a235411d7d90da0351901b9.dll
Resource
win10v2004-20220812-en
General
-
Target
b8c17448a31b4bdda8ac464cab36179547f465a83a235411d7d90da0351901b9
-
Size
936KB
-
MD5
0c8f47cdf67abaa7d7e9ea7b21dfa5c0
-
SHA1
2cbdfadf4ad4ab3629bb61df50e49f31aabb421b
-
SHA256
b8c17448a31b4bdda8ac464cab36179547f465a83a235411d7d90da0351901b9
-
SHA512
366d19a0db31e6bf3ded19adcf01e2ac2410af0fde796bdbb5ea26d6d3b57de3c5d53e8a5592f0363a7dc69cfceba3a8b9167f9b154dcc82ad16a3ed98f60085
-
SSDEEP
24576:jEYmIiYwBsbhlpr0ntrILnp5bxU1iHgzXGIYY+ACW1lXmk:jE3QwBsbx0pILnp5x0iAzGTACW11mk
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
b8c17448a31b4bdda8ac464cab36179547f465a83a235411d7d90da0351901b9.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.7MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 931KB - Virtual size: 932KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE