run
Behavioral task
behavioral1
Sample
8ef0fcc4278b91a6cbd0d2a3f739c348f2bc60a5eda3466f706abe8d6af48d41.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ef0fcc4278b91a6cbd0d2a3f739c348f2bc60a5eda3466f706abe8d6af48d41.dll
Resource
win10v2004-20221111-en
General
-
Target
8ef0fcc4278b91a6cbd0d2a3f739c348f2bc60a5eda3466f706abe8d6af48d41
-
Size
166KB
-
MD5
69c93d1c76310de02bcc358412de995a
-
SHA1
a54efb1d061468831a8c6ba5226a1f3c334c15fb
-
SHA256
8ef0fcc4278b91a6cbd0d2a3f739c348f2bc60a5eda3466f706abe8d6af48d41
-
SHA512
63c6aaae4b565c57d9750645c666abd70da693dd4bd74acb3c8cd511f9df27951cfe59422c6a3d5f52d73e7fb9b6c5a0a53f3f58c2f78808cbc2d6f7b4c38a5e
-
SSDEEP
3072:jvtsnTIYCBxqcMyi6XV3CYngz0WYgicLX1tMYrFwQ9sd/qyvF0d:z2uaiX5Q0W91tjqQ9sBHF0
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
8ef0fcc4278b91a6cbd0d2a3f739c348f2bc60a5eda3466f706abe8d6af48d41.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 13.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 164KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE