Behavioral task
behavioral1
Sample
9e1805d9ee454304a3b728d7173fd950b5c2f14c6024a07e40814f13bf4f4f3a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9e1805d9ee454304a3b728d7173fd950b5c2f14c6024a07e40814f13bf4f4f3a.dll
Resource
win10v2004-20221111-en
General
-
Target
9e1805d9ee454304a3b728d7173fd950b5c2f14c6024a07e40814f13bf4f4f3a
-
Size
277KB
-
MD5
32cd5f7a418c29c9ab1feff7b9607c5b
-
SHA1
3487702e93494d4e30807ebb699ea4191728673a
-
SHA256
9e1805d9ee454304a3b728d7173fd950b5c2f14c6024a07e40814f13bf4f4f3a
-
SHA512
2eed7f0f1a8453103ab5a0debdfc98772534051f325e187fb7daa6d18a1e404a05f67a79fc28fdcda8009c14167dff743cefe0b882ace5febab01d80ab6d5357
-
SSDEEP
6144:swNPX3PnKbvwcSuHOZMhOtxKn8V6wXJLA48oLiYRNQt/+Rm4soSZn:swPX3/KbvweuOhsJFlT82RIE84soSZ
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
9e1805d9ee454304a3b728d7173fd950b5c2f14c6024a07e40814f13bf4f4f3a.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 368KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 274KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE