Behavioral task
behavioral1
Sample
a45dd542f12e7cc12ddf074cda330d540642844471e18d7f3c082e3d5fe484ca.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a45dd542f12e7cc12ddf074cda330d540642844471e18d7f3c082e3d5fe484ca.dll
Resource
win10v2004-20221111-en
General
-
Target
a45dd542f12e7cc12ddf074cda330d540642844471e18d7f3c082e3d5fe484ca
-
Size
29KB
-
MD5
ab80bb829049691b6b7d3cac75dfbdf9
-
SHA1
fcfcd670a5e14abf280879bb130007e74399112e
-
SHA256
a45dd542f12e7cc12ddf074cda330d540642844471e18d7f3c082e3d5fe484ca
-
SHA512
94c633b6d37208a3ff386d4aaffc5bd97e50798d4c2599153afea9611e189bdf77510e43e085053a4457b45ad4d334dea83e554f1d6a400fc4f88e9e331567cb
-
SSDEEP
768:aQttfI2zlSuWIb6BIto/COtHitZKXCFzGCwaawu9Zi6S/xCGD:aWf1lS26BItItHrXCwCw5P9Q6Cwa
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
a45dd542f12e7cc12ddf074cda330d540642844471e18d7f3c082e3d5fe484ca.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE