Behavioral task
behavioral1
Sample
d4926b04699989bafbff4312a06a8a475ce64f570266ea92a4d490434bb6f020.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d4926b04699989bafbff4312a06a8a475ce64f570266ea92a4d490434bb6f020.dll
Resource
win10v2004-20221111-en
General
-
Target
d4926b04699989bafbff4312a06a8a475ce64f570266ea92a4d490434bb6f020
-
Size
209KB
-
MD5
a270e38b153ff08bce6124f1beba810e
-
SHA1
9d21e9047b89991a0bf93358633d16de060643b3
-
SHA256
d4926b04699989bafbff4312a06a8a475ce64f570266ea92a4d490434bb6f020
-
SHA512
4c93e8c0a41135f529c375b6434385c6272c16114181fa322b4c90e27ac2cfb3883dacaa77c3b17debd4093c45fe85160038b5128e701d087d2aea11091e54c2
-
SSDEEP
3072:0dedG8p3BsSA/E2YhDQ6VEShGkVZnYQf58Xy2nb7OYB5BhIqgLhO2:0SJ0EDs6fkksQhK7OYB5B
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
d4926b04699989bafbff4312a06a8a475ce64f570266ea92a4d490434bb6f020.dll .ps1 windows x86