YHooPLooLOooGH
Behavioral task
behavioral1
Sample
8487af4fe9a84f1041245618881b18fa8152f1b765b888e9c6043bf96d7dd890.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8487af4fe9a84f1041245618881b18fa8152f1b765b888e9c6043bf96d7dd890.dll
Resource
win10v2004-20221111-en
General
-
Target
8487af4fe9a84f1041245618881b18fa8152f1b765b888e9c6043bf96d7dd890
-
Size
260KB
-
MD5
cc9fa8e482790fd254350300855bc59e
-
SHA1
732885f45bf8d1c6e76ed72f1c67212d351aa6e1
-
SHA256
8487af4fe9a84f1041245618881b18fa8152f1b765b888e9c6043bf96d7dd890
-
SHA512
e7b2c92e597ebfe3f4118d26053dabd0f4b0c8f333bc5328c9ce59e91d67039ab1f08a93a1605d6044b841742a1861957d3d33011edfe0f83b022a8d933bd69c
-
SSDEEP
6144:uNnr58yXHEofwgw7IoZ5Ofb54Gd7niP+l83+RpwYkDgwUbPChE5fW0oS:u/ZXrfZwUosmGo20+RpwY8S+hE5W0oS
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
8487af4fe9a84f1041245618881b18fa8152f1b765b888e9c6043bf96d7dd890.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 652KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 255KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE