Behavioral task
behavioral1
Sample
e6943fa91d27b80f7c98006ec9abbd10be169b0386750c77b1bd9f47d3909b3a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e6943fa91d27b80f7c98006ec9abbd10be169b0386750c77b1bd9f47d3909b3a.dll
Resource
win10v2004-20221111-en
General
-
Target
e6943fa91d27b80f7c98006ec9abbd10be169b0386750c77b1bd9f47d3909b3a
-
Size
172KB
-
MD5
b67fd7e08c6ddb47d7fe1ab2ecb47369
-
SHA1
674738def4a2297688ada8fc243fb832061485f4
-
SHA256
e6943fa91d27b80f7c98006ec9abbd10be169b0386750c77b1bd9f47d3909b3a
-
SHA512
badbc50571432f9e3d5eb365ea2078413cbaaa755cc3f84934caa65aaf3cd3404a0c2d79baf922d6734412e0e78aa19cf25921d254c9896a774b84af2f108cc4
-
SSDEEP
3072:L2BzJpLbwkRqN3/nO4pl7c1K+paoMPlX2XfmlLylI+NNfLrs0VVVWuEDY2:WJ5b61nO4plshpa3imlO6+TrsYvWuE
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
e6943fa91d27b80f7c98006ec9abbd10be169b0386750c77b1bd9f47d3909b3a.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 272KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 166KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE