Behavioral task
behavioral1
Sample
fb328c9544b864dc15e5a5b623e3fa741e9ca4f7922740023104decec4556675.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb328c9544b864dc15e5a5b623e3fa741e9ca4f7922740023104decec4556675.dll
Resource
win10v2004-20220812-en
General
-
Target
fb328c9544b864dc15e5a5b623e3fa741e9ca4f7922740023104decec4556675
-
Size
275KB
-
MD5
9fbd7a0f3d4d3d3ff451adf5b7f392c1
-
SHA1
03cb1c6e3629857b55121213308daeddb78c6a76
-
SHA256
fb328c9544b864dc15e5a5b623e3fa741e9ca4f7922740023104decec4556675
-
SHA512
0484670e7d1da0c157da43e3922e24c7bb0ef40b2f80a3bdd7f0a75b085992c3ef9f7923f976c99a0e919845940b264c57b7e168507c64daf51a7a527c81a9c5
-
SSDEEP
6144:vWDUzWeVuuAfNNDx1IienQYKxbh+wLPQVPeXo0d0YsoSG:xXoHPY8LPaWXo0O1oSG
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
fb328c9544b864dc15e5a5b623e3fa741e9ca4f7922740023104decec4556675.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 364KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 272KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE