Behavioral task
behavioral1
Sample
2063ac2f582c754eb907445e157b5c94b6e0388b2f745261d999d909aa594c15.dll
Resource
win7-20221111-en
4 signatures
150 seconds
General
-
Target
2063ac2f582c754eb907445e157b5c94b6e0388b2f745261d999d909aa594c15
-
Size
41KB
-
MD5
f80e03929b4a497536be0885ac548630
-
SHA1
1b15b7aa230e346fb0d5ea615273301af11ac4d6
-
SHA256
2063ac2f582c754eb907445e157b5c94b6e0388b2f745261d999d909aa594c15
-
SHA512
f6afec8e240a595deec51126a264226fe5e17defb1cb744a211ffab870490d69d387b0f0c993dca51282a40a13af48929a937cb1cb50a6a4d1e51f8e5709d9a5
-
SSDEEP
768:8UZ0wcsPUi/JR84m78VWFGAjffLFSsPtZaD6RKsUhlHbxYiONiWi:8qcsPUiz84e8s0wbJvfKsUzx+i
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
2063ac2f582c754eb907445e157b5c94b6e0388b2f745261d999d909aa594c15.dll .js regsvr32 windows x86