Behavioral task
behavioral1
Sample
d8cd219e311ed0331e8a7a015e3491ce24263bdc54cc36de49d1fa46641b1ad8.dll
Resource
win7-20221111-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
d8cd219e311ed0331e8a7a015e3491ce24263bdc54cc36de49d1fa46641b1ad8.dll
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
d8cd219e311ed0331e8a7a015e3491ce24263bdc54cc36de49d1fa46641b1ad8
-
Size
32KB
-
MD5
52960a860bfada69a518103d364d0eee
-
SHA1
bbcbad05a96af9a289b295d41cb66d6dbef2e42c
-
SHA256
d8cd219e311ed0331e8a7a015e3491ce24263bdc54cc36de49d1fa46641b1ad8
-
SHA512
6367437b7e0ed9ef69c257f17085be56afda837ccf5106985dea15c7790d85f164aa1ad12f11290752f5384ac4c1481759fba88dff1b9fd2ce6e0d4d945dcd64
-
SSDEEP
768:QXc/MaoE4Ec5maAVodZ2ubPg7QEuvTq7W0N:WcH4p4aAuP2oEu7qS0
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
d8cd219e311ed0331e8a7a015e3491ce24263bdc54cc36de49d1fa46641b1ad8.dll .ps1 windows x86