DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Behavioral task
behavioral1
Sample
99dbb427a21ccbd8a8dfb020f6360a881b97f0ec04e83c27e81a3090d27f38a7.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
99dbb427a21ccbd8a8dfb020f6360a881b97f0ec04e83c27e81a3090d27f38a7.dll
Resource
win10v2004-20221111-en
Target
99dbb427a21ccbd8a8dfb020f6360a881b97f0ec04e83c27e81a3090d27f38a7
Size
33KB
MD5
4363b479053b0236872cc93644fe9a70
SHA1
cbca2566375f5ebf3ee10176c8cdc65d1ae142cf
SHA256
99dbb427a21ccbd8a8dfb020f6360a881b97f0ec04e83c27e81a3090d27f38a7
SHA512
6ff3a05128cf3ca51f397dda9df3f8303feb3e2742a1cb03b0d65cd95f30483ec10abe5071653397b5b36c4958bf940d20b5f676704373cf87ca9be127a3f099
SSDEEP
768:cKSoqu380GQplBoJaeR1q7K+3XQeN4W4M49wk/T2z:Uoqu380GQplBoQwIL3XQeB4Z9wN
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ