DebugBreakpoint
DllCanUnloadNow
DllGetClassObject
Service
SpawnAndStart
Start
Uninstall
Behavioral task
behavioral1
Sample
bcaf58f04ddea970e238e373d2927a0d.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bcaf58f04ddea970e238e373d2927a0d.dll
Resource
win10v2004-20240226-en
Target
bcaf58f04ddea970e238e373d2927a0d
Size
75KB
MD5
bcaf58f04ddea970e238e373d2927a0d
SHA1
9557b09675e51e547051d554133f8b74a457f3b1
SHA256
d485e0efe5029198138fb4b48c38950d7f19ebb65553253df6531c1a8bd4ca61
SHA512
829a462679556cb3e7e4af3a1ce4410f1385d0b2ebf35fed209cfb4bbbac3baa4366c01fc5ea0b38bfd9e006837a438758ff25de26123e0bd39d8f4d08cf904d
SSDEEP
1536:SMdYV3jsAG4Cef5BTjGaxMRAQsiMngjiGofjSiW038fuD5w9:3YVu415B4AQszoel3+uk
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
bcaf58f04ddea970e238e373d2927a0d |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DebugBreakpoint
DllCanUnloadNow
DllGetClassObject
Service
SpawnAndStart
Start
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ