Behavioral task
behavioral1
Sample
8fa4ebb8351c7218445405def30787bb449725ec44198b592dbd70cf202a47f4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8fa4ebb8351c7218445405def30787bb449725ec44198b592dbd70cf202a47f4.dll
Resource
win10v2004-20221111-en
General
-
Target
8fa4ebb8351c7218445405def30787bb449725ec44198b592dbd70cf202a47f4
-
Size
98KB
-
MD5
e0d2144800a6cc0bb49b2523bfebc5c5
-
SHA1
2f1c6084b63f28ec0cf2e14c878ba58fb8a46b8a
-
SHA256
8fa4ebb8351c7218445405def30787bb449725ec44198b592dbd70cf202a47f4
-
SHA512
2ad6a3b9438717e005acd82d0533f8d6c3d73b3fdd0f71a157edafde4aa87e1af772ec3dd63306cfe29f3c439babb48f2cc9dbb8e26626c3edc8d52f834a6359
-
SSDEEP
3072:u6G6bec28uwIEy0QZ1kfsqszB7vuDtEQ6zUva:u6vec28uxEy0QZqdszB7vWEQqqa
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
8fa4ebb8351c7218445405def30787bb449725ec44198b592dbd70cf202a47f4.dll windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 96KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 68KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE