Behavioral task
behavioral1
Sample
48d35a256d2abcf3f1bd1a85929d69237a382ecc1c2a6d7fbd2a97a224b327e2.dll
Resource
win7-20221111-en
General
-
Target
48d35a256d2abcf3f1bd1a85929d69237a382ecc1c2a6d7fbd2a97a224b327e2
-
Size
131KB
-
MD5
b9f848e0ac18f54b3a6c10f1d0066e00
-
SHA1
08d7722f72adeb338d92569b531376edccfc726f
-
SHA256
48d35a256d2abcf3f1bd1a85929d69237a382ecc1c2a6d7fbd2a97a224b327e2
-
SHA512
f93a87cfb082ee8de8a4b0258b0d90d52627eab6fb6f6efeeb6d7a102479f651b06a2d935e0ac133c2c3408c60f5e68ea6f18758235d248ecacdf33f915a29fc
-
SSDEEP
1536:jLIZfrbeqfSE1mE+Y+Bsge5gPIebbEezrWR931JaEPWvWtnMQ4BoXG4kDHZjqE1k:j8Z/N1mEbHgQ92bEj9lEOm6nM5BFVUH1
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
48d35a256d2abcf3f1bd1a85929d69237a382ecc1c2a6d7fbd2a97a224b327e2.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ