___CPPdebugHook
Behavioral task
behavioral1
Sample
f2b07b1ca4de6b2d3a4d17d1b2ca6de7b525b7948a19f5661f04d5a37da67e93.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2b07b1ca4de6b2d3a4d17d1b2ca6de7b525b7948a19f5661f04d5a37da67e93.dll
Resource
win10v2004-20220812-en
General
-
Target
f2b07b1ca4de6b2d3a4d17d1b2ca6de7b525b7948a19f5661f04d5a37da67e93
-
Size
249KB
-
MD5
1502ef9f21d620b0848953d1e2327e6e
-
SHA1
b55daec351bd849e335006f11d91883b02cbc7b0
-
SHA256
f2b07b1ca4de6b2d3a4d17d1b2ca6de7b525b7948a19f5661f04d5a37da67e93
-
SHA512
ef6a5e002de209d39de4a00fc1ed6ada72a5045a3374bdacc5ec6ec65732234e51aa1d12a98bae239c00cfc69c63f6850f1121535f73de861f7b1cf76dc9dee8
-
SSDEEP
6144:xq1LLJh8G4Ztffoycg8bQoRhYTXnyO3Qz/2yczRmzDOC:xq1fJuBZFCp8z/3Q/lrzCC
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
f2b07b1ca4de6b2d3a4d17d1b2ca6de7b525b7948a19f5661f04d5a37da67e93.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 460KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 246KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE