Behavioral task
behavioral1
Sample
dd358b1cedbe72ab113e54bf02ffc4a6a5e2cc7a3e4e6107c69b094332709b91.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dd358b1cedbe72ab113e54bf02ffc4a6a5e2cc7a3e4e6107c69b094332709b91.dll
Resource
win10v2004-20220812-en
General
-
Target
dd358b1cedbe72ab113e54bf02ffc4a6a5e2cc7a3e4e6107c69b094332709b91
-
Size
83KB
-
MD5
b8d04402539c5bcd295836d984412693
-
SHA1
4a81b12db69c90081db75c4b319e027bca0b1665
-
SHA256
dd358b1cedbe72ab113e54bf02ffc4a6a5e2cc7a3e4e6107c69b094332709b91
-
SHA512
f6df2b8f80ce9333f98f19e572225e91f4fa858842e11555c0091ad1afd08f122347e9649174eacb02e63e14fef1cf412b977df89480a4657860c87e04be9779
-
SSDEEP
1536:tq4wwJx3Z78O6ioCsoN33Q/a9E43w7Jsn/5PgII4al9/9mkooqRbxnouy8tA:E4wwV7CpToNHQ/apV1g1tmkJqVxoutt
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
dd358b1cedbe72ab113e54bf02ffc4a6a5e2cc7a3e4e6107c69b094332709b91.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 84KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE