Behavioral task
behavioral1
Sample
e9341cd2edb4a72b449802f4e6a82020f498ca4f809b359cbc4db275ca7d7cd2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e9341cd2edb4a72b449802f4e6a82020f498ca4f809b359cbc4db275ca7d7cd2.dll
Resource
win10v2004-20220812-en
General
-
Target
e9341cd2edb4a72b449802f4e6a82020f498ca4f809b359cbc4db275ca7d7cd2
-
Size
275KB
-
MD5
f8cf0ccada22dd2ef74e550944fecc42
-
SHA1
ddc8ce8873b12ee7f206a3a79c1adfb1c8a6d94a
-
SHA256
e9341cd2edb4a72b449802f4e6a82020f498ca4f809b359cbc4db275ca7d7cd2
-
SHA512
dfb7e36b883363e97c9376c884587c49f0d43b2b78d7a38c6bc5511f69df47dc9cfc5119401ebfb16181d97cd5a86b7a6f61f2ec2103086ed3fccbc33643a513
-
SSDEEP
6144:iiKNMh4JZO52UmikHViTEVhUNHs5zpTbfaOP8haIHIVU9MoS1:vr4JZKMHViTMS1i1Tbf7kHoWMoS1
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
e9341cd2edb4a72b449802f4e6a82020f498ca4f809b359cbc4db275ca7d7cd2.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 364KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 272KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE