GetNewInf
GetNewSock
Behavioral task
behavioral1
Sample
ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173.dll
Resource
win10v2004-20221111-en
Target
ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173
Size
406KB
MD5
6aea0226a87d8d144963ab68b02009ac
SHA1
6dcc3d247ac8e872c8cfb7db73e1de1032fc6b11
SHA256
ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173
SHA512
d171cb12715b1952d4f214780472668d57604e1f4efba798f1a84dab633ab39a95830ec80dee4a7abfa5969ea4d472f21f54d99ff480d02660c41e3f9489af4a
SSDEEP
12288:7RrQLhYW3kv/eT2TEjXqYZsEVUyXe5U1:7Rkuv/jEuYaKUaey1
Detects file using ACProtect software.
Processes:
resource | yara_rule |
---|---|
sample | acprotect |
Processes:
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetNewInf
GetNewSock
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ