Behavioral task
behavioral1
Sample
4d21ec66dc2c50417aaa5922c472cf462bd75c07f5951f422aa78f39e55d0759.dll
Resource
win7-20220812-en
General
-
Target
4d21ec66dc2c50417aaa5922c472cf462bd75c07f5951f422aa78f39e55d0759
-
Size
35KB
-
MD5
1fb6e3947edd545cb8b8ed9c32d9b66d
-
SHA1
e572a1d1bd373090f965744b347f0fa9cda7c89d
-
SHA256
4d21ec66dc2c50417aaa5922c472cf462bd75c07f5951f422aa78f39e55d0759
-
SHA512
ed1e744c636d0df3cdf2f36de1e159fee6d8df26c3f9b5669bf16d08bf9469b1bad148e7c8c299f7b9ce41e82f2f9dbccd6b5e68e02005af6777d50a905e574e
-
SSDEEP
768:+yI8Ja1AXF8eSMnekVoRNl2+nWMmDwL21/lnbcuyD7UA:+84yF8eSOZVYN87+I/lnouy8A
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
4d21ec66dc2c50417aaa5922c472cf462bd75c07f5951f422aa78f39e55d0759.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 84KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE