Behavioral task
behavioral1
Sample
c05b8332683222ebbf9a3f3ec78204929eb3ff6508499fb3991caf3b948ec70a.dll
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c05b8332683222ebbf9a3f3ec78204929eb3ff6508499fb3991caf3b948ec70a.dll
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
c05b8332683222ebbf9a3f3ec78204929eb3ff6508499fb3991caf3b948ec70a
-
Size
7KB
-
MD5
10c04989e6cd754498554d3ef83f29d2
-
SHA1
e662fd8cbf2f86b47517b741e88b6f362212fe10
-
SHA256
c05b8332683222ebbf9a3f3ec78204929eb3ff6508499fb3991caf3b948ec70a
-
SHA512
5b9d48e21966cdcaf32e5576fc9f2bf4a1f9f759a1085a0fa43dd95ddb0f585f69841d68fa190379fe433c316d86363b19c41e00d3f5fe687ba3c0be8e9f4afc
-
SSDEEP
192:TTcCpVs2c/YUjnJUIMAK9FlsfpiUcjM6aRaV:TTjpUQUjnvB8Gi
Score
9/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
c05b8332683222ebbf9a3f3ec78204929eb3ff6508499fb3991caf3b948ec70a.dll .vbs windows x86