_ldr@16
Behavioral task
behavioral1
Sample
a6f59255ae398967150dc117336e8bbd485bb0373a6d536fcb0933f98072701f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a6f59255ae398967150dc117336e8bbd485bb0373a6d536fcb0933f98072701f.dll
Resource
win10v2004-20221111-en
General
-
Target
a6f59255ae398967150dc117336e8bbd485bb0373a6d536fcb0933f98072701f
-
Size
25KB
-
MD5
da3cbc80a2035bcb4c6ad9314c85eef0
-
SHA1
2853253058b0543052f29719c2b029b8dc2f6601
-
SHA256
a6f59255ae398967150dc117336e8bbd485bb0373a6d536fcb0933f98072701f
-
SHA512
b6daee5e38af0032f2b9eb1f6dd0a079bd930ded2bb995407998eb783f11f6204b1e7059cce657c04c5b4c3e06607c1478b186ab2cc3c6babed16607966421f1
-
SSDEEP
384:d4cvbhvCA6G1vaiuZRss4+p6h12zIf7jU0c0JOmKDCvjRiaaHC8V86rtR:d1zuG1pYRnZMvwsjXvUu7RaC+8+tR
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
a6f59255ae398967150dc117336e8bbd485bb0373a6d536fcb0933f98072701f.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ