jksHook
jtzHook
Behavioral task
behavioral1
Sample
0a3ca720c4bebf62bd6988fb660ecc08.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a3ca720c4bebf62bd6988fb660ecc08.dll
Resource
win10v2004-20231215-en
Target
0a3ca720c4bebf62bd6988fb660ecc08
Size
20KB
MD5
0a3ca720c4bebf62bd6988fb660ecc08
SHA1
bd7283153d637cc531079ca37a46cd50d5a5062e
SHA256
e9392c6e9d0a4e8037fc1c9aebdeeb3e4f592286ed89611010fbf02602f9c5d0
SHA512
c3ab3268b366560e38cf61c5b8d5ed5d43aa8b3959491b097e796f989a96816f2b365e1a477d0f81446d61fbf26ef2bab2a2cb4acc584854b0488c1b6369759b
SSDEEP
384:Au6B4y8hiDHkA8JyUxG0dN9Egv408fOCrRvbdJpiCcVPTLJ0XQPD9bQcx7AO6ME/:Auc8hyQyUTn2gQ0AOC1DvpHQLJWQbhJS
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
0a3ca720c4bebf62bd6988fb660ecc08 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
jksHook
jtzHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ