Behavioral task
behavioral1
Sample
c868e25783acf344c0807fa8939884a15d37034989f7c0085571ee3322239ea2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c868e25783acf344c0807fa8939884a15d37034989f7c0085571ee3322239ea2.dll
Resource
win10v2004-20220812-en
General
-
Target
c868e25783acf344c0807fa8939884a15d37034989f7c0085571ee3322239ea2
-
Size
110KB
-
MD5
a6989dbb2c8d517898d430425ba8c31f
-
SHA1
ec678b21cf81db8e01a15c28fd3c36d3558378ec
-
SHA256
c868e25783acf344c0807fa8939884a15d37034989f7c0085571ee3322239ea2
-
SHA512
5d5801552be0620cba7486c72ccca0f74ed86715e5fbf910862918001a422fdbe4d662b27f6004c749220a48008dc96c669869c0e1b843535a811f3ac2327427
-
SSDEEP
3072:5n+AQceoZSWHp4TRGbEtWiTFnRQo9zFYpSxboutw:IOeoQDTRLFnf9ziSxboS
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
c868e25783acf344c0807fa8939884a15d37034989f7c0085571ee3322239ea2.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE