PlgDestroy
PlgGetAbout
PlgGetDirectLink
PlgInit
Behavioral task
behavioral1
Sample
7358b72660e3c980a6f946f580f36196.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7358b72660e3c980a6f946f580f36196.dll
Resource
win10v2004-20231222-en
Target
7358b72660e3c980a6f946f580f36196
Size
30KB
MD5
7358b72660e3c980a6f946f580f36196
SHA1
cfdbc495c24a5c4cdf5d0d73fc0fe0abd6e30dc6
SHA256
e86c368c2083ca167dcabf1f23783cae78bc191bea30189f63b7e7d98f4b90b0
SHA512
14a51ab7a317182ab28a5c8fde2d49116d44310934fceeec81f7d731dcd3be4121009258d7d73e59469600de9d8bbb5046a5535e3175f010f7941e172c8b4cca
SSDEEP
384:w8ibGt1IqH9IgoxkS7ZKEU0vxy49R5rVOo45rOcFwrrnMSXUQvFM88cMCKim9C:N3ztIgoZ0EUd49R5JOokOcF0rMSZvsQ
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
7358b72660e3c980a6f946f580f36196 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
PlgDestroy
PlgGetAbout
PlgGetDirectLink
PlgInit
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ