Behavioral task
behavioral1
Sample
b739d8d2eee99fd0f35f0b31130a71b23fd17aef3efda9dd93f90bc626aae146.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b739d8d2eee99fd0f35f0b31130a71b23fd17aef3efda9dd93f90bc626aae146.dll
Resource
win10v2004-20220812-en
General
-
Target
b739d8d2eee99fd0f35f0b31130a71b23fd17aef3efda9dd93f90bc626aae146
-
Size
10KB
-
MD5
f12c4b2664837d86d04a1fe568c924f0
-
SHA1
30d9033fcbd11ddd950afb4a3a4700830df4fa9f
-
SHA256
b739d8d2eee99fd0f35f0b31130a71b23fd17aef3efda9dd93f90bc626aae146
-
SHA512
1d22dc5b3729f10818dc27fa54c1764b690fd03f7a5271782db2fb73b0b6df07b8acc69fc2acb94287716835882044c23c22da2c2573dab141917dec86801d9f
-
SSDEEP
192:yXUPUArccooU9qxTRdX16fOZLJbu+Nk3aynjRC14WGIp+q:yEPEcobTAdxfynjASW
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
b739d8d2eee99fd0f35f0b31130a71b23fd17aef3efda9dd93f90bc626aae146.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 316KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ