Behavioral task
behavioral1
Sample
a7f22d095dcab17b03d00ef2c97841a6cc607bd9513577c1537e1aaa872224f2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a7f22d095dcab17b03d00ef2c97841a6cc607bd9513577c1537e1aaa872224f2.dll
Resource
win10v2004-20220812-en
General
-
Target
a7f22d095dcab17b03d00ef2c97841a6cc607bd9513577c1537e1aaa872224f2
-
Size
124KB
-
MD5
670f5609a6afb2f733782009d530a76e
-
SHA1
dcc04733f62bf87292f360bfe06996b9e8f18264
-
SHA256
a7f22d095dcab17b03d00ef2c97841a6cc607bd9513577c1537e1aaa872224f2
-
SHA512
8b36d7fc88bcd8696eb73f050a2242b7b06b85ebc3c6de7b8f31260034b8a7ff29973e8127cd0248bb9f7c683e5900135f4b2a16006be783d9ae09c3f9b0eacb
-
SSDEEP
3072:DwwpKkoo9c+nvYc2Yn25KozC+VWH39K4+m4HgIIgj+8SOlw:cwp6o9fngE2oozZVWHtFg2
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
a7f22d095dcab17b03d00ef2c97841a6cc607bd9513577c1537e1aaa872224f2.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 248KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 110KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE