Behavioral task
behavioral1
Sample
a12d5752bd6313c111c1a0167d225aa206b9bcb86727097f8e24d7261942c2c6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a12d5752bd6313c111c1a0167d225aa206b9bcb86727097f8e24d7261942c2c6.dll
Resource
win10v2004-20220812-en
General
-
Target
a12d5752bd6313c111c1a0167d225aa206b9bcb86727097f8e24d7261942c2c6
-
Size
277KB
-
MD5
1525b781a3ec1fce6682a0a77f36f7b0
-
SHA1
41539970ecd3e2e9dd1cca6ec695e818bd98993c
-
SHA256
a12d5752bd6313c111c1a0167d225aa206b9bcb86727097f8e24d7261942c2c6
-
SHA512
4bd5e9cc223ce7c338ad5b6b27544c79193990d935b4d39b6e0178d56e48b3304fdf116bbeed23b83497be25d91efc8fb42e4d576be2056a8eb934b143a71e33
-
SSDEEP
6144:bn3vZfCtxaLIgVXXbjSCc5VEGOhE8Qcso8ExG49/fSMoSCY:bxfCWIKXbjMVErhfQcso8F49/aMoSCY
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
a12d5752bd6313c111c1a0167d225aa206b9bcb86727097f8e24d7261942c2c6.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 368KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 273KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE