Behavioral task
behavioral1
Sample
a8b33e7b986cd0a76d4d2c0bc0bdee410709cea2d4ac36e033665a959070d2ff.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8b33e7b986cd0a76d4d2c0bc0bdee410709cea2d4ac36e033665a959070d2ff.dll
Resource
win10v2004-20220812-en
General
-
Target
a8b33e7b986cd0a76d4d2c0bc0bdee410709cea2d4ac36e033665a959070d2ff
-
Size
278KB
-
MD5
d21a0f3705e1f0c59cafd8a30618b466
-
SHA1
16f61bda07e11214da5a0eb40d0dc1ce9a96cf19
-
SHA256
a8b33e7b986cd0a76d4d2c0bc0bdee410709cea2d4ac36e033665a959070d2ff
-
SHA512
1ad38829c2ce4470f80e677462012a830e44ae56dd5cd4a84b0c371f23160b9c0387cfa41dd44e5305aec0702dacfa224a5a5b08ac84edc7bfecadb6d175ca0b
-
SSDEEP
6144:7PjfQKjQhWepxFfoJOfU5cJCyrz3f3NtTPTLX37Q1QjDfoSo:jjbgnfwACyrzPnLcKDfoSo
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
a8b33e7b986cd0a76d4d2c0bc0bdee410709cea2d4ac36e033665a959070d2ff.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 368KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 274KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE