Behavioral task
behavioral1
Sample
00d0f00b3e5dd0196866e446a0d1803b4fa0eedb093ec0b80838c9201d06c70d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00d0f00b3e5dd0196866e446a0d1803b4fa0eedb093ec0b80838c9201d06c70d.dll
Resource
win10v2004-20220812-en
General
-
Target
00d0f00b3e5dd0196866e446a0d1803b4fa0eedb093ec0b80838c9201d06c70d
-
Size
54KB
-
MD5
adde9a0c9b94e7450a290a66aeb06a86
-
SHA1
36352be7a970037d330be590d6503c4037b9155f
-
SHA256
00d0f00b3e5dd0196866e446a0d1803b4fa0eedb093ec0b80838c9201d06c70d
-
SHA512
c4e8c7b50d9dbb08667b943fadbdef535005d3f169e18fa94201b023a2bcfcdc698acfef37e91f60aa6256f26c63123833945a18b070081d548b55e0c4451f5b
-
SSDEEP
768:33fKxMstJ1nybOaABa/tyvwzyoukLuJcQRY/SnpI/NKS4bfRj1XceZa8mGbxQ1cf:nixMstznY1//duLcQTa/IXzlxHaS5
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
00d0f00b3e5dd0196866e446a0d1803b4fa0eedb093ec0b80838c9201d06c70d.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 53KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE