SetHook
Behavioral task
behavioral1
Sample
e92b150d115a4d378b526844af806cbfede726739f2411e88e3fec6430dde0c4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e92b150d115a4d378b526844af806cbfede726739f2411e88e3fec6430dde0c4.dll
Resource
win10v2004-20221111-en
General
-
Target
e92b150d115a4d378b526844af806cbfede726739f2411e88e3fec6430dde0c4
-
Size
32KB
-
MD5
5115f82dc12cd3a38f1ec59163b2137a
-
SHA1
12568791360f892dea5a026bd14d73d074f01575
-
SHA256
e92b150d115a4d378b526844af806cbfede726739f2411e88e3fec6430dde0c4
-
SHA512
a2526aa2ca880421a4cf39273241496aec7ad68deeeb21d1aabaac9121f380559e01b25be75350458c0c785451e05652340be5cac125952b1ac9b010e943083c
-
SSDEEP
192:BxNtysVhblA9FNDK5lzcfi5njbF7HMX6kdviLs+/uxFaPIvozoV0DtvOtST/T0fn:TXyspA9q8IhMXXdveuX0VL4fbuXF
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
e92b150d115a4d378b526844af806cbfede726739f2411e88e3fec6430dde0c4.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
.UPX1 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: 15KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE