Behavioral task
behavioral1
Sample
57c810a600417f252d2a4cb1f76b8405bf90df8f1f5ef434252811bdd31805dc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57c810a600417f252d2a4cb1f76b8405bf90df8f1f5ef434252811bdd31805dc.dll
Resource
win10v2004-20220812-en
General
-
Target
57c810a600417f252d2a4cb1f76b8405bf90df8f1f5ef434252811bdd31805dc
-
Size
113KB
-
MD5
d0e382dac515de30778f7b56239dc2ac
-
SHA1
8d849d36b5513117ee6e24069bd9d406fc6f4628
-
SHA256
57c810a600417f252d2a4cb1f76b8405bf90df8f1f5ef434252811bdd31805dc
-
SHA512
c3fa4808b272712dca7c125d3fc125cc06bfe6787a5263c6085f39e932097ff411f8e357a8a2945959a1f8d612bb65f274548068e4870215dbdab1e87ddb6780
-
SSDEEP
3072:m8Ns5HuaKlAihQ5jcxgP6b9bjKPAyRhPr:m8Ns5HudlZ8Ijryjr
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
57c810a600417f252d2a4cb1f76b8405bf90df8f1f5ef434252811bdd31805dc.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 110KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE