Behavioral task
behavioral1
Sample
d60e4d3e63ad682ac1898f3244f1a102bfd08babaa021f278ad7c8644608dbf6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d60e4d3e63ad682ac1898f3244f1a102bfd08babaa021f278ad7c8644608dbf6.dll
Resource
win10v2004-20220812-en
General
-
Target
d60e4d3e63ad682ac1898f3244f1a102bfd08babaa021f278ad7c8644608dbf6
-
Size
60KB
-
MD5
be0b02f8d548c01b7c8b24a44c76ebef
-
SHA1
882b2f831ec90183bf997d03b68d73a44ffecfa7
-
SHA256
d60e4d3e63ad682ac1898f3244f1a102bfd08babaa021f278ad7c8644608dbf6
-
SHA512
a4b63845ab58ef6f764ca9bd6f0e8255663d1f2f9848aaff32fe8c2f49863f3595ce6feb83f95e87557e869aa1a1ca2f97141d75a0dc7393f486cc51c8dafef2
-
SSDEEP
1536:nihRXI7vhbqSjMDAR4Thcsz5pRsA7KBilfBV1Sp5Kce7OAch:nEI7k7WccWD768BfS3e7OAY
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
d60e4d3e63ad682ac1898f3244f1a102bfd08babaa021f278ad7c8644608dbf6.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 58KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ