Behavioral task
behavioral1
Sample
ea5cc474874b163f98bc9b04a5bb7b6aeb2b5bfbdb58189ab305ff4b76e44afb.dll
Resource
win7-20221111-en
windows7-x64
10 signatures
150 seconds
General
-
Target
ea5cc474874b163f98bc9b04a5bb7b6aeb2b5bfbdb58189ab305ff4b76e44afb
-
Size
134KB
-
MD5
25be0557ff7085c2696024c14dc703a2
-
SHA1
71af85d6e0a8dc897697b3f713139a984fa9503a
-
SHA256
ea5cc474874b163f98bc9b04a5bb7b6aeb2b5bfbdb58189ab305ff4b76e44afb
-
SHA512
44f179e9d4a8759fde0ca13e9922c8841e794ec66506fe0e6e8cc34cf97c304efc8c2032cb3fd39a0a1b9c75bd2fa72c54a04885d7d5dacc7c16dc73a7675934
-
SSDEEP
3072:WxWdc5+VuZdcEKFNsM//wq3BG1LIulzGbMtebi8wHz:WvEuZdk0Mn7mUuBuMT
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule sample acprotect -
Processes:
resource yara_rule sample upx
Files
-
ea5cc474874b163f98bc9b04a5bb7b6aeb2b5bfbdb58189ab305ff4b76e44afb.dll .ps1 windows x86