Behavioral task
behavioral1
Sample
ff09d666d4244a0b8e08565fb839ed6fc27dff6933471b6421ff8316250e5645.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ff09d666d4244a0b8e08565fb839ed6fc27dff6933471b6421ff8316250e5645.dll
Resource
win10v2004-20221111-en
General
-
Target
ff09d666d4244a0b8e08565fb839ed6fc27dff6933471b6421ff8316250e5645
-
Size
277KB
-
MD5
eb3ca0995b7f69f19c990e765f874b02
-
SHA1
ae1f05c850e2dab5344e091e49b70cfac3d2214c
-
SHA256
ff09d666d4244a0b8e08565fb839ed6fc27dff6933471b6421ff8316250e5645
-
SHA512
aff32b02de26a5ccce6ed1576c312ce63bc49caf576457b46d75a2a6680b151a945f12b4e916a654450b8343c922bbf34ec5bf29a3da756fcd26621b091b9fb5
-
SSDEEP
6144:nmvusx2KfBYs7LwKbLkOKEd9mFerrAAn9OElmvr/RjiD4ZTamU15iDxoSG:nmGsx2YBTwKbwOKh6rAAhor90Aalqxob
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
ff09d666d4244a0b8e08565fb839ed6fc27dff6933471b6421ff8316250e5645.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 364KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 275KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE