CPlApplet
Behavioral task
behavioral1
Sample
430ca22e989a7c1eddc54e18196570efd029b2091346192b150a548bed95471b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
430ca22e989a7c1eddc54e18196570efd029b2091346192b150a548bed95471b.dll
Resource
win10v2004-20220812-en
General
-
Target
430ca22e989a7c1eddc54e18196570efd029b2091346192b150a548bed95471b
-
Size
147KB
-
MD5
f1f95b951947f2a873e1fea4e656f062
-
SHA1
18c1409da7dbc8b9199932676d45be6bc32a92e9
-
SHA256
430ca22e989a7c1eddc54e18196570efd029b2091346192b150a548bed95471b
-
SHA512
3bb10040177e33bda75a39b73b08e6d7f572e564d270e53aff6a519ba4d4f528f8675d6154a0a2191898ddbbb48e536116114755f0a5598d5416b9f2aae3d363
-
SSDEEP
3072:/yByeB2GytJZXP5pdUo3OTqyWQYb2lR7B46op110TyA:/yHrgUo3dQYbIlBop
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
430ca22e989a7c1eddc54e18196570efd029b2091346192b150a548bed95471b.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Exports
Exports
Sections
UPX0 Size: - Virtual size: 292KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 126KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE