Behavioral task
behavioral1
Sample
dc15e2f00ca65dd1334f58da61554155fca9c4c632a27d6c7ee3bffdd17fd344.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc15e2f00ca65dd1334f58da61554155fca9c4c632a27d6c7ee3bffdd17fd344.dll
Resource
win10v2004-20220812-en
General
-
Target
dc15e2f00ca65dd1334f58da61554155fca9c4c632a27d6c7ee3bffdd17fd344
-
Size
11KB
-
MD5
4f0cd6841e69ae8698e5cf4c337a3063
-
SHA1
8d6f2852daee9e4af0f1316ff1f131bb54791e0c
-
SHA256
dc15e2f00ca65dd1334f58da61554155fca9c4c632a27d6c7ee3bffdd17fd344
-
SHA512
3217c266039e5c8a6f8ff72975d5cb4f39c2a8788b6a08e76934c8db687299e2b5a2c3373186970d40386a30427b13ff4109088db1f084588942c1024d4a6bf0
-
SSDEEP
192:2CY6OVN6/DX8gtAySzHshJ7beKASXWuTRpYe62aUwv9GufZQO6K7F8a51Guib:7XMM/DXXBSzHM7bfNmqc0apfZQObP38
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
dc15e2f00ca65dd1334f58da61554155fca9c4c632a27d6c7ee3bffdd17fd344.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll .vbs windows x86