PlgDestroy
PlgGetAbout
PlgGetDirectLink
PlgInit
Behavioral task
behavioral1
Sample
104d293f093d070788dc5dc1de5edf10.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
104d293f093d070788dc5dc1de5edf10.dll
Resource
win10v2004-20231215-en
Target
104d293f093d070788dc5dc1de5edf10
Size
30KB
MD5
104d293f093d070788dc5dc1de5edf10
SHA1
63704704e4610eb9f3b4745c9699bf5d08216486
SHA256
e8139209cead397d9fde8335ff1090edd5b8c5e753e0363d9fecda4bd4910250
SHA512
82e3e3a24e613325875bab1f67f6480f84402fc3fd63f1fdea19a1f1c0fc50a37236bd57e37626e2fa8dad78bfcc84113a1260f914c00d9d4b3c853e2953be62
SSDEEP
768:+3ztIgoZ0EUB8u1ooRvLUddaAjlzFL8e1Kv:+3aBZUBFuivLUWAvL8ek
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
104d293f093d070788dc5dc1de5edf10 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
PlgDestroy
PlgGetAbout
PlgGetDirectLink
PlgInit
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ