Behavioral task
behavioral1
Sample
85292b240e50be185b2fef106ab332589103206ef380e7354d1148cd1cf98ca8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
85292b240e50be185b2fef106ab332589103206ef380e7354d1148cd1cf98ca8.exe
Resource
win10v2004-20220812-en
General
-
Target
85292b240e50be185b2fef106ab332589103206ef380e7354d1148cd1cf98ca8
-
Size
456KB
-
MD5
3145ba4cd6eb3df6a670a4d72f548c42
-
SHA1
a5bcb4c9d60dee99f7a292dddc6ff3159d2ba6c4
-
SHA256
85292b240e50be185b2fef106ab332589103206ef380e7354d1148cd1cf98ca8
-
SHA512
2c532c77315d68dd68be71d7999e578f586ef15f66832397ef6d9870b20c383c4c4bc0dcdf21bf9909e6056123077f972fdc4d1292edd322225c7145305f9f51
-
SSDEEP
12288:++PCTU1xjMgT93ZAFWVW/Ch9ICHm63gtRnhH+xOR:++r93SF5/Ch2CiRnheS
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
85292b240e50be185b2fef106ab332589103206ef380e7354d1148cd1cf98ca8.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 54KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE