Behavioral task
behavioral1
Sample
7a8d6808f6b5ae064be8ec32d897a374e908ea1d466d89fd11474b5b1cd65ba6.dll
Resource
win7-20220901-en
4 signatures
150 seconds
General
-
Target
7a8d6808f6b5ae064be8ec32d897a374e908ea1d466d89fd11474b5b1cd65ba6
-
Size
41KB
-
MD5
0ce231cfddc2f2b09a30625566b10130
-
SHA1
568b587c7e00de68d835f4bb247f29e356ae7b13
-
SHA256
7a8d6808f6b5ae064be8ec32d897a374e908ea1d466d89fd11474b5b1cd65ba6
-
SHA512
af83e7e42811492c522948dfbc4322d41f41d1ca136fe9d31f63a6470e175cac01505c1b37df8861e0b7c68f0b10035c0c30a656bcefc721cee607e6743849f9
-
SSDEEP
768:NOAFFs0cGeCUAHs4ISSSUpKxg3RmLp8Lmxm27cz1GLuPdGVYi+eacl:Nts4F5Sg8Lmxm27o0LuGVla
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
7a8d6808f6b5ae064be8ec32d897a374e908ea1d466d89fd11474b5b1cd65ba6.dll .js regsvr32 windows x86