Behavioral task
behavioral1
Sample
73a65a5f1617f0f12b9cf13adaff7d720a9000710e9cd96116b355abf6515d16.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
73a65a5f1617f0f12b9cf13adaff7d720a9000710e9cd96116b355abf6515d16.dll
Resource
win10v2004-20220812-en
General
-
Target
73a65a5f1617f0f12b9cf13adaff7d720a9000710e9cd96116b355abf6515d16
-
Size
443KB
-
MD5
3195042df79e6a6b353b18cada7a9eac
-
SHA1
a4a49d3dce5da96d7676ad0827eb628dd96fc303
-
SHA256
73a65a5f1617f0f12b9cf13adaff7d720a9000710e9cd96116b355abf6515d16
-
SHA512
268c2339afb1e639b56e22200aecc5a214be3d2217e47dc1faba52f0e3fe96ba318e4c60da6a9b6d0221cd28d68493766202f38d26b6ec032a60aa89515e1fa7
-
SSDEEP
6144:B7uOGsfZ4iel4j+SLPvgAAiSi+L634Y1m1JRTRzNVA4OXyF9CTDtP9Um3Ivazghk:9wsfepl2PvgAZ59+BvCT5PiRvMqEx
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
73a65a5f1617f0f12b9cf13adaff7d720a9000710e9cd96116b355abf6515d16.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 336KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 438KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll .vbs windows x86