Behavioral task
behavioral1
Sample
5c1938b66e479ef53c8601eec28b0cf905374c922fa7a05a1d76203b9921b992.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5c1938b66e479ef53c8601eec28b0cf905374c922fa7a05a1d76203b9921b992.dll
Resource
win10v2004-20220812-en
General
-
Target
5c1938b66e479ef53c8601eec28b0cf905374c922fa7a05a1d76203b9921b992
-
Size
113KB
-
MD5
1cd48ca07e03ca4dd9b2a7075048c238
-
SHA1
44d70f9fd7431b0d8c6b2abced3ecec6e04d5c83
-
SHA256
5c1938b66e479ef53c8601eec28b0cf905374c922fa7a05a1d76203b9921b992
-
SHA512
9707108a0de75f58e31600e423a4e6a86f6d8e79a252acd9eee0de0575eaa3e49f269d4d51de8d7cfa09e3448dfe49d6d0ac2f997b60e3f3fc7065c60bd39a4e
-
SSDEEP
1536:T8b0zyJO5R1fGyPk8zS6lglv9xs+YuVfJfQViw1jkt5PY3P6d5sXmbHDK9hqdj6U:T8Ns5HuaKlAihQ5jcxgP6b9bjK2gNz
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
5c1938b66e479ef53c8601eec28b0cf905374c922fa7a05a1d76203b9921b992.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 110KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE