run
Behavioral task
behavioral1
Sample
50a1bde9dcdf0a8401817598b1019007f4de62ec3aa000be3c25d0be99682e83.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
50a1bde9dcdf0a8401817598b1019007f4de62ec3aa000be3c25d0be99682e83.dll
Resource
win10v2004-20220812-en
General
-
Target
50a1bde9dcdf0a8401817598b1019007f4de62ec3aa000be3c25d0be99682e83
-
Size
157KB
-
MD5
918c266af10407f2875506a79dd83441
-
SHA1
577131dcfe25bd49978d57233540182f5634ac7e
-
SHA256
50a1bde9dcdf0a8401817598b1019007f4de62ec3aa000be3c25d0be99682e83
-
SHA512
1bf99a460b825961bdd1e35f92737c530414331895a6d10bd2457f2688e75fa522d7682653fefb6787c6ee031222f572dc47e3b76b086abd8492b07eddcff9ee
-
SSDEEP
3072:+VI2gfjdYWGdH9piyipdjawT/ffhIes2wlOnBqH9Np:+VIff0HTVipVaIfA2wlyC
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
50a1bde9dcdf0a8401817598b1019007f4de62ec3aa000be3c25d0be99682e83.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 13.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE