Behavioral task
behavioral1
Sample
9ad08a66486cf903a54d406ca2f161a4209848aaac7f2f25e85611231f22966b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9ad08a66486cf903a54d406ca2f161a4209848aaac7f2f25e85611231f22966b.dll
Resource
win10v2004-20221111-en
General
-
Target
9ad08a66486cf903a54d406ca2f161a4209848aaac7f2f25e85611231f22966b
-
Size
272KB
-
MD5
16d09b8047e4fab586941bab1a36cc44
-
SHA1
3652787b05e3b964d3b0ce8bcbfbf230b81ccf40
-
SHA256
9ad08a66486cf903a54d406ca2f161a4209848aaac7f2f25e85611231f22966b
-
SHA512
7fb9f28faf33aaac176053286d1a4dc04c77933f4fb29765a8265386d8b24a1d9b7d9ed8a39eedbe935534de16b7d0bc08c6dcb454244a3c7642a3149a49790b
-
SSDEEP
6144:1uk1w/UeYwhH6UfTH9Smk3fXoxpEgW9Tt863LBYQE1+QoSR:1uk1wDhaUfTILYOr95t3L29sQoSR
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
9ad08a66486cf903a54d406ca2f161a4209848aaac7f2f25e85611231f22966b.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 372KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 270KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE