Behavioral task
behavioral1
Sample
fb70c093b398dd82ad144fb26d1755cd7779b54ffd217ccc2f89577b11d89936.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
fb70c093b398dd82ad144fb26d1755cd7779b54ffd217ccc2f89577b11d89936
-
Size
41KB
-
MD5
2cf3505183b323371601ce1d2e6cd510
-
SHA1
537df3f33c9147923899bc9e588988ffb86c3f2c
-
SHA256
fb70c093b398dd82ad144fb26d1755cd7779b54ffd217ccc2f89577b11d89936
-
SHA512
70190d02872346da071b6cb2460bca4c554b94a619f2dbdab50c2ed753960ff757d0dec091ab8cb47c5794e151bbb416545ffa7d64de43663afd8862d2cfcfac
-
SSDEEP
768:OOAFFs0cGeCUAHs4ISSSUpKxg3RmLp8LmxoBBP8H6wq35xPF:Ots4F5Sg8LmxovE6f
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
fb70c093b398dd82ad144fb26d1755cd7779b54ffd217ccc2f89577b11d89936.dll .js regsvr32 windows x86