CPlApplet
Behavioral task
behavioral1
Sample
5980aaa867b05b39b80dc45182d3e214da209e2b935c24c1f5bb04a21b34f17b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5980aaa867b05b39b80dc45182d3e214da209e2b935c24c1f5bb04a21b34f17b.dll
Resource
win10v2004-20221111-en
General
-
Target
5980aaa867b05b39b80dc45182d3e214da209e2b935c24c1f5bb04a21b34f17b
-
Size
158KB
-
MD5
0479d20b95602fa602b61d95020b0ddc
-
SHA1
3513c0fc985575f71a2224b27d7087eb205429f9
-
SHA256
5980aaa867b05b39b80dc45182d3e214da209e2b935c24c1f5bb04a21b34f17b
-
SHA512
7f6d138f4ea242f974b62656b54186ffc7b7e728b9a0a0b966a74b7fff7783b0d047eb6e2816e8675f8d2c69c3144c9cc85933cfe5a579a265c5fe86a6617835
-
SSDEEP
3072:sVpuXiyfIA9ZiP2A89bPJH8O0nHVwAJmkGbvFdIbRkHAxztWn/FLvJK/D183nS:sVpugA9wunlPJHP0zJJGBWbRG0hYFLc5
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
5980aaa867b05b39b80dc45182d3e214da209e2b935c24c1f5bb04a21b34f17b.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Exports
Exports
Sections
UPX0 Size: - Virtual size: 256KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 153KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE