Behavioral task
behavioral1
Sample
838c79a697fad14195fa1fae4844ab68c40a1cb8452edb9278a81b2662395e2a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
838c79a697fad14195fa1fae4844ab68c40a1cb8452edb9278a81b2662395e2a.dll
Resource
win10v2004-20221111-en
General
-
Target
838c79a697fad14195fa1fae4844ab68c40a1cb8452edb9278a81b2662395e2a
-
Size
6KB
-
MD5
67d62dced02e1dda2854ce17da420fd4
-
SHA1
501c91526dc54f29b8d1e28c6bafdd3b222cb6c1
-
SHA256
838c79a697fad14195fa1fae4844ab68c40a1cb8452edb9278a81b2662395e2a
-
SHA512
5df0ec4a185e66314e385574b7118e84cae340a0abb28dd977221159155ef1fe0927be9cfb53b0f277f34f4114ef0999946c3a55fbfb5b215e4ce830ab9fdadb
-
SSDEEP
96:cTTEkOLuXXvCUL717SX02Vl8ksd5Hnb8+IFSr7CtdfB9kdoOv+dg0yZ5X0:cT8anvRZ7y0yadJb8+IFSnkdPWo+H
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
838c79a697fad14195fa1fae4844ab68c40a1cb8452edb9278a81b2662395e2a.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 802B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ