Behavioral task
behavioral1
Sample
96cdc94ebdae848ac5aaad7bdac5f45267b4923bc4cb58b4cfc31382d4ac4049.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
96cdc94ebdae848ac5aaad7bdac5f45267b4923bc4cb58b4cfc31382d4ac4049.dll
Resource
win10v2004-20220812-en
General
-
Target
96cdc94ebdae848ac5aaad7bdac5f45267b4923bc4cb58b4cfc31382d4ac4049
-
Size
316KB
-
MD5
b5f465a9dfb78c1c454b0a6f09f177d7
-
SHA1
bccb3eb9f691f3e7ddd6d36111621aae91c543a1
-
SHA256
96cdc94ebdae848ac5aaad7bdac5f45267b4923bc4cb58b4cfc31382d4ac4049
-
SHA512
c163fe3608aab27c92d159af6e5c07a32effbc55ceb41777455d593552ffc765db322de47ce73358e3adf9019c78a03db04b75d6025ed821aa2b3bea6ef87a20
-
SSDEEP
6144:srEl9UFL5vu87y5n/VKnXg2GvFqXPb0soa4uW8/X2Q+VSdpHXs:sEl9e7y5dKXg2Gt0PNoaLW3Q+0dVXs
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
96cdc94ebdae848ac5aaad7bdac5f45267b4923bc4cb58b4cfc31382d4ac4049.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 128KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 314KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll .vbs windows x86