Behavioral task
behavioral1
Sample
f2fcdaef3e26bbcd7d26411f270aa432261af92bbe47e35aa73e02c00bf6b26c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2fcdaef3e26bbcd7d26411f270aa432261af92bbe47e35aa73e02c00bf6b26c.dll
Resource
win10v2004-20220812-en
General
-
Target
f2fcdaef3e26bbcd7d26411f270aa432261af92bbe47e35aa73e02c00bf6b26c
-
Size
91KB
-
MD5
5b1b9090601d5b74b3798dc172c2ec87
-
SHA1
7910d3f4a8ecda91f1f29f6af0c30f36bfd9f48a
-
SHA256
f2fcdaef3e26bbcd7d26411f270aa432261af92bbe47e35aa73e02c00bf6b26c
-
SHA512
d145ec51b04a08e108c8057e17b5cd265c594b59acc8fcf9ff10aa6d64f6aa32aa0c9e55956ab1e6598f4fe92d9df86f654fc7cdffec6dfbd5ac4d50d9845dc2
-
SSDEEP
1536:zmZsnkWJHCtfK4W4qKOcOep+yHzdJgbraa9BBSNr59fOcQvrct:a6oCB4IeTdJkWa/ENt9fTQvW
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
f2fcdaef3e26bbcd7d26411f270aa432261af92bbe47e35aa73e02c00bf6b26c.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 129B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ