Behavioral task
behavioral1
Sample
36c2d94c846dc58b6f1051b8bba48acaf144ce526f5186d6d0a414ea075e9852.dll
Resource
win7-20220901-en
4 signatures
150 seconds
General
-
Target
36c2d94c846dc58b6f1051b8bba48acaf144ce526f5186d6d0a414ea075e9852
-
Size
43KB
-
MD5
44e7bc4a109ecab3e69cc8628b25dbd0
-
SHA1
bca04076d72d725753108af8f9fb81b8f41e3691
-
SHA256
36c2d94c846dc58b6f1051b8bba48acaf144ce526f5186d6d0a414ea075e9852
-
SHA512
21d1732056d1a37a55107ad976946979c446d5b7e7229bb35059dbf0077cfbdb805c331bb0e97821478b7569df2c413eb2dffe5c101e7448725366eaf5674029
-
SSDEEP
768:GkDtGrmb7DHjBPyxqGqboT0uDzsqZRqYEgqg8Cp+uOj1HCucGD:GkDtmmb7DHjBPytqby0ktYgqghT0D
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
36c2d94c846dc58b6f1051b8bba48acaf144ce526f5186d6d0a414ea075e9852.dll .js regsvr32 windows x86