Behavioral task
behavioral1
Sample
48e16a88ee15fca15785e9416162b2e72a0077bc34709d990569466a2d000f06.dll
Resource
win7-20221111-en
4 signatures
150 seconds
General
-
Target
48e16a88ee15fca15785e9416162b2e72a0077bc34709d990569466a2d000f06
-
Size
70KB
-
MD5
d40c47ac14d97c4b2b42cd954a8acd80
-
SHA1
5277ac447f1300e2275961f24f35dc8ee6c18dd7
-
SHA256
48e16a88ee15fca15785e9416162b2e72a0077bc34709d990569466a2d000f06
-
SHA512
57d5fd71b0f6ee2811d517f365a0cde3e8a8a093b414777ba6f76c7cbef1fc612c0bfb29fb4d0f88659470bd1d4c02177a59767f2e3119ab905990fcfef7cae6
-
SSDEEP
1536:ckeZxq4eR+9NCiMPbnVS1z71rTmzNT4pk5q5ch/O1s:heaI9NCVPbwZ8zNx50chx
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
48e16a88ee15fca15785e9416162b2e72a0077bc34709d990569466a2d000f06.dll .ps1 regsvr32 windows x86