Init
Behavioral task
behavioral1
Sample
25e7607d6ca0b850d7460a8681b10d15c11dd639158e8f25507b4dd96c6b808a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
25e7607d6ca0b850d7460a8681b10d15c11dd639158e8f25507b4dd96c6b808a.dll
Resource
win10v2004-20220901-en
General
-
Target
25e7607d6ca0b850d7460a8681b10d15c11dd639158e8f25507b4dd96c6b808a
-
Size
65KB
-
MD5
400883977c824ad67b1c9cc9526ecaa6
-
SHA1
faff729c3fca7bd34670fd0b847e18c2c1f19c9f
-
SHA256
25e7607d6ca0b850d7460a8681b10d15c11dd639158e8f25507b4dd96c6b808a
-
SHA512
582b580d3011bc2c58b7752fffaa5ec76e9d8ef2815c400f022e337f4335890322022cdb925c3de829da4122afcac11d05b84cece4d1f2f58f3b3be0e5e21c30
-
SSDEEP
1536:WsQRw7Ktkyi+tviYjSMCd4HLIWTeG+Vf0LnRp41EPAk:WsPWtkZQviT4HLheTVup41EPA
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx
Files
-
25e7607d6ca0b850d7460a8681b10d15c11dd639158e8f25507b4dd96c6b808a.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ