Behavioral task
behavioral1
Sample
8468f0823f70f1e032209d7b377d499ba407ffca53fd98423162db18df2bec71.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8468f0823f70f1e032209d7b377d499ba407ffca53fd98423162db18df2bec71.dll
Resource
win10v2004-20221111-en
General
-
Target
8468f0823f70f1e032209d7b377d499ba407ffca53fd98423162db18df2bec71
-
Size
49KB
-
MD5
3f7fbaa6cbf971aa62b3e3a45126253e
-
SHA1
dd41d262bc974ed287ac3cad6ce7cd23f445277f
-
SHA256
8468f0823f70f1e032209d7b377d499ba407ffca53fd98423162db18df2bec71
-
SHA512
a3e64d8e55c1b25346c553d60d0cc5e35397b254d856f1786d94b7b4177d573bd35c63e29901aa91c7dffce4b7701460023d2e7d4aaf8b9f9d414a1bd078cae2
-
SSDEEP
1536:tEReCLOpf+sjFdo9gInuWzwbAHXnouy8bd:tERe9f+sKDsbAXoutbd
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
8468f0823f70f1e032209d7b377d499ba407ffca53fd98423162db18df2bec71.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE