sm
Behavioral task
behavioral1
Sample
eb34f6b89093849755d73cc7da3f2db6c9f3a9ea5a82c50bee11976e57e549c3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb34f6b89093849755d73cc7da3f2db6c9f3a9ea5a82c50bee11976e57e549c3.dll
Resource
win10v2004-20221111-en
General
-
Target
eb34f6b89093849755d73cc7da3f2db6c9f3a9ea5a82c50bee11976e57e549c3
-
Size
12KB
-
MD5
b0ea00ae62423cf3f5579f9bb4124c3c
-
SHA1
fa06fcfc35f20c40c8351ddffdf86c61b1f53339
-
SHA256
eb34f6b89093849755d73cc7da3f2db6c9f3a9ea5a82c50bee11976e57e549c3
-
SHA512
98943580fcc3be2ad74b451a107196f87bb6a935224d9413bf18008518afefde024c0b168c3cb32f4aa87be5b893bafe3fa01024066418d8dcfa03015382884b
-
SSDEEP
192:Ja6GJGJkEP6+EtNf2eloYLmVQH/gjSi9U0xKk3Bm3:J2GJ5EtN+1VQHpiiTp
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
eb34f6b89093849755d73cc7da3f2db6c9f3a9ea5a82c50bee11976e57e549c3.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll .js windows x86