Behavioral task
behavioral1
Sample
977395ced3e0e11c50bb3ce6e9d3aa74.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
977395ced3e0e11c50bb3ce6e9d3aa74.dll
Resource
win10v2004-20231222-en
General
-
Target
977395ced3e0e11c50bb3ce6e9d3aa74
-
Size
115KB
-
MD5
977395ced3e0e11c50bb3ce6e9d3aa74
-
SHA1
50baa83cc5129f35810ededb8212500567cd2878
-
SHA256
1530b408e8bd32167e528d96c68428188435e94d16e9a9d6f6ccbad63df9b633
-
SHA512
b783bb5045edd536ed58c67912591848353596b3c098c6f89166c36cd3af6be050ef480bb152d34c55a7266654b063eee285fbecfee63c6444960ab9e57b4d50
-
SSDEEP
3072:4DXKgoTfN0ZQ39EtyXrtzAtjP4uzxGj0pXVDWusGnWh:b5TT9E4btzOjguzUY7fsh
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 977395ced3e0e11c50bb3ce6e9d3aa74 unpack001/out.upx
Files
-
977395ced3e0e11c50bb3ce6e9d3aa74.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
UPX0 Size: - Virtual size: 160KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 113KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 183KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ