?GetOS@Utility@@SAKXZ
Behavioral task
behavioral1
Sample
87e83ab8274a3dab0bf4d660a1546ab7ed80eb93fca2bb8f458464ad668c62de.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
87e83ab8274a3dab0bf4d660a1546ab7ed80eb93fca2bb8f458464ad668c62de.dll
Resource
win10v2004-20220901-en
General
-
Target
87e83ab8274a3dab0bf4d660a1546ab7ed80eb93fca2bb8f458464ad668c62de
-
Size
23KB
-
MD5
93d7b76e22f4690af10577b204e9dd40
-
SHA1
8268734f75c47831d71141cf55054e4c310c4f81
-
SHA256
87e83ab8274a3dab0bf4d660a1546ab7ed80eb93fca2bb8f458464ad668c62de
-
SHA512
342ee6bcb29cb9adb2fa588f267f673b50a5c4df44dd24054b859de8e6a2e585755153c6b1e5f397301cbee21aabc7c459fc6d4adf2c0fa502af086262cbdd8f
-
SSDEEP
384:CfRPsjKJ6zu7E68HoTqEbfOYwEVArBfpyTp6qzlT5+sKEov5aEYIVDDQ:CJ2jxoeEbO8VArBcsslovkEB4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
87e83ab8274a3dab0bf4d660a1546ab7ed80eb93fca2bb8f458464ad668c62de.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ