Behavioral task
behavioral1
Sample
6ee103065d0cc58f93101ce62300bfc9d7a6c154f64429158f1970c533cb0a27.dll
Resource
win7-20220812-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
6ee103065d0cc58f93101ce62300bfc9d7a6c154f64429158f1970c533cb0a27.dll
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
6ee103065d0cc58f93101ce62300bfc9d7a6c154f64429158f1970c533cb0a27
-
Size
50KB
-
MD5
2f559248926cc41c5167b0db5b1e7f10
-
SHA1
eead42fd1f0ccb8bf08d15c3e6b67b3243885901
-
SHA256
6ee103065d0cc58f93101ce62300bfc9d7a6c154f64429158f1970c533cb0a27
-
SHA512
fcc885a4023c2eec87f46f0a595b7e53d8ac3b8c3d5c9d82cb48dea88d41f5e99b3240251db5a32642a14dfcdcea4b9798265fc5ad02a28532f133f568a2a225
-
SSDEEP
1536:Emej+/6M9/+C+UvSY0JzKu+bnPCnouy8B:POGGCShJzK7GoutB
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
6ee103065d0cc58f93101ce62300bfc9d7a6c154f64429158f1970c533cb0a27.dll .ps1 windows x86