Behavioral task
behavioral1
Sample
5a530ead10252b945bfdddd173a4425539df35a4210e20d2528ac284399471ab.dll
Resource
win7-20221111-en
4 signatures
150 seconds
General
-
Target
5a530ead10252b945bfdddd173a4425539df35a4210e20d2528ac284399471ab
-
Size
41KB
-
MD5
6feea9640d49c5f485a6b29fd711c050
-
SHA1
40d69f7c8810dbab314133e26483b541ae108771
-
SHA256
5a530ead10252b945bfdddd173a4425539df35a4210e20d2528ac284399471ab
-
SHA512
90612c99ae519d33f94e3007cacf054d5cc19650a329adff2cd7a148206301a56335d839bd4b9292cbb22ce8db35cc7f1307a5ce50c9bba45cdd809f8b780d6a
-
SSDEEP
768:uUZ0wcsPUi/JR84m78VWFGAjffLFSsPtZaD6RKsUhlHbxYiONiWi:uqcsPUiz84e8s0wbJvfKsUzx+i
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
5a530ead10252b945bfdddd173a4425539df35a4210e20d2528ac284399471ab.dll .js regsvr32 windows x86