Behavioral task
behavioral1
Sample
f3096b3ae60f7dce9c6137e8d3b324f0ef975fcc04524ece12b3f4a41c955527.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f3096b3ae60f7dce9c6137e8d3b324f0ef975fcc04524ece12b3f4a41c955527.dll
Resource
win10v2004-20221111-en
General
-
Target
f3096b3ae60f7dce9c6137e8d3b324f0ef975fcc04524ece12b3f4a41c955527
-
Size
210KB
-
MD5
110d0d3d0e5ecd5930380c8d6aa2564a
-
SHA1
20dc2029745a80141e4f618624e432053812e85e
-
SHA256
f3096b3ae60f7dce9c6137e8d3b324f0ef975fcc04524ece12b3f4a41c955527
-
SHA512
93f2353111fbc62a817f85e013f8d362eb547ccf92cfbb4f59e6205a0282f5e49f73be8120e2b886ce1b4c1b123a065ef7c6cddd892cc9b984ce44be092df920
-
SSDEEP
6144:t4746oo4TgMe9HHVnq1iFEKBQ4F9kgPgI/XoScr:tw9SiiKf7oSi
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
f3096b3ae60f7dce9c6137e8d3b324f0ef975fcc04524ece12b3f4a41c955527.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 428KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE