DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InitDll
InitO
Behavioral task
behavioral1
Sample
2a80f7c870d4d198c046e424ea4b3885.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2a80f7c870d4d198c046e424ea4b3885.dll
Resource
win10v2004-20231222-en
Target
2a80f7c870d4d198c046e424ea4b3885
Size
35KB
MD5
2a80f7c870d4d198c046e424ea4b3885
SHA1
7a39241ed4b009ffbaf31828e94cc68d2747cb79
SHA256
4610dbda8831a0e4bfde656182bfa93d98a8acbb0c6b10dd06d973d09e8cb600
SHA512
d28ad2ad6b1c2f649f78660207fc51f61db8828b16cb311992808d65dc3edf5f2bdb58a05d59402770dda9480059610f040b7e7b4ad3062294bf728b9b396a14
SSDEEP
768:tU7Q/dPWPCDFln8hc8xpOjsP8s/hD76fhPLq5ma:LJWQFRic8xpOjsP8WhD76fpLqx
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
2a80f7c870d4d198c046e424ea4b3885 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InitDll
InitO
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ