Behavioral task
behavioral1
Sample
df04913d4363522106cb99080a7709cc20fab4969444349175ca87a980857909.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df04913d4363522106cb99080a7709cc20fab4969444349175ca87a980857909.dll
Resource
win10v2004-20220812-en
General
-
Target
df04913d4363522106cb99080a7709cc20fab4969444349175ca87a980857909
-
Size
17KB
-
MD5
32186cf9ae482a874946cea0bd3fffd1
-
SHA1
fb548d559b265384e4ec8501f43fd95e75df4849
-
SHA256
df04913d4363522106cb99080a7709cc20fab4969444349175ca87a980857909
-
SHA512
19defb745abffb6ca33f4c725a0beaab7cbb08a291d4b0863585c7a9d27d79016754be200817460a146f1d79f963acbaa3c2f53e1b616ac28c739030c23e93bd
-
SSDEEP
384:2/wi+wMa7pbZNZyVW5Qtn8Rvq3R4TXvmn6:2bD7p0VCOnEy3+TXOn6
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
df04913d4363522106cb99080a7709cc20fab4969444349175ca87a980857909.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ