Behavioral task
behavioral1
Sample
c3fe6b995d320b32cb5239e35e57762a567340a6c3bf596af1d1981c9bc10b79.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c3fe6b995d320b32cb5239e35e57762a567340a6c3bf596af1d1981c9bc10b79.dll
Resource
win10v2004-20220812-en
General
-
Target
c3fe6b995d320b32cb5239e35e57762a567340a6c3bf596af1d1981c9bc10b79
-
Size
106KB
-
MD5
df847f5f1b01739a9cdf2383fec24b7a
-
SHA1
b71eab042525452e0e54b0b1902621b0c2b67fa8
-
SHA256
c3fe6b995d320b32cb5239e35e57762a567340a6c3bf596af1d1981c9bc10b79
-
SHA512
e82e57878baa6a053d51b32a8112803b36443eb96c1e46ca7d5529e321a565f5a40b200c99f22cbdab0514752f8a27b1a415749b88ef00efbdf8464d4ba20b1e
-
SSDEEP
1536:vSrML7XgWQcE0P7F9905I6RhQ/fe6fBBk0S212UF0mxSpaIw6i1JTYCZeyr33Vlt:vSraLJBNQ6X/5S2N0mgfw6+zZey7rt
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
c3fe6b995d320b32cb5239e35e57762a567340a6c3bf596af1d1981c9bc10b79.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE