Behavioral task
behavioral1
Sample
6533ffd2c6880efd58c00b4c9806993a8a97ce1f3b3f90fe61705ffb12b14628.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6533ffd2c6880efd58c00b4c9806993a8a97ce1f3b3f90fe61705ffb12b14628.exe
Resource
win10v2004-20221111-en
General
-
Target
6533ffd2c6880efd58c00b4c9806993a8a97ce1f3b3f90fe61705ffb12b14628
-
Size
4.3MB
-
MD5
3ddc1c9614b374fd0c0eb3451520ba0f
-
SHA1
18624b5cfae96f0027091acd782e154b4a74988b
-
SHA256
6533ffd2c6880efd58c00b4c9806993a8a97ce1f3b3f90fe61705ffb12b14628
-
SHA512
35a5dd96e37dedd302e7e3b3b16f95b4ed635f7fb62a19089c100d22654695240bd95ac35af7a0fbe9571c5925606b03ea1340fca18bb87d1ef646a278ff1391
-
SSDEEP
98304:/glGb8PdoMyD2/pvFpgFRbogHJRiXv8gY1Fk8kiD7Ffy3vvNsPsG8CUbLQmX/0rK:KS+GMq2/BngnBOkFZGvNP+UbLQmX/0e
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
6533ffd2c6880efd58c00b4c9806993a8a97ce1f3b3f90fe61705ffb12b14628.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 140KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE