Behavioral task
behavioral1
Sample
e56f7ccfb505f5902d89250cd074946f336d2eca1be2b1b31fefaed703bb7650.dll
Resource
win7-20220901-en
4 signatures
150 seconds
General
-
Target
e56f7ccfb505f5902d89250cd074946f336d2eca1be2b1b31fefaed703bb7650
-
Size
41KB
-
MD5
e23ceeb45eec4515dcf6c776fd98e290
-
SHA1
742cae2faa51a06281ed2ffc57c01c8145413867
-
SHA256
e56f7ccfb505f5902d89250cd074946f336d2eca1be2b1b31fefaed703bb7650
-
SHA512
e5197928ff9c13c5dae48b01aca8aad42cd305ba0cff8e8e5611a63d0b6474f7fe8f59269036fd12d22b7ce98c50ec9eb56983ffc327d2d75f992f8c32b58581
-
SSDEEP
768:5OAFFs0cGeCUAHs4ISSSUpKxg3RmLp8Lmx251GLuPdGPYi+eaQF:5ts4F5Sg8Lmxs0LuGPla
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
e56f7ccfb505f5902d89250cd074946f336d2eca1be2b1b31fefaed703bb7650.dll .js regsvr32 windows x86