Behavioral task
behavioral1
Sample
626aba48151c4803dcd80820dca52cbf6580a9aee7f8d36f39fe3bd1dadb7b35.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
626aba48151c4803dcd80820dca52cbf6580a9aee7f8d36f39fe3bd1dadb7b35.dll
Resource
win10v2004-20221111-en
General
-
Target
626aba48151c4803dcd80820dca52cbf6580a9aee7f8d36f39fe3bd1dadb7b35
-
Size
444KB
-
MD5
f61282b4d9c547664a50df567dae2bd0
-
SHA1
ed6376089e798c71e55528a3f7cdae383da23a35
-
SHA256
626aba48151c4803dcd80820dca52cbf6580a9aee7f8d36f39fe3bd1dadb7b35
-
SHA512
bc4827359b934501e301a7578234438a98327dc36855914937df43329450c24197d60c5797337e35d5d4b0fb68b7dae69a2c264ea76d8ef4f2fffb16d4ff3287
-
SSDEEP
6144:s7uOGsfZ4iel4j+SLPvgAAiSi+L634Y1m1JRTRzNVA4OXyF9CTDtP9Um3IvazghA:Owsfepl2PvgAZ59+BvCT5PiRvMqER
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
626aba48151c4803dcd80820dca52cbf6580a9aee7f8d36f39fe3bd1dadb7b35.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 336KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 438KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll .vbs windows x86