DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Behavioral task
behavioral1
Sample
4d21cdfd812ba66276db02ab19861e8c86cdd6384bf9d2b9f086beec314c67cc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4d21cdfd812ba66276db02ab19861e8c86cdd6384bf9d2b9f086beec314c67cc.dll
Resource
win10v2004-20220812-en
Target
4d21cdfd812ba66276db02ab19861e8c86cdd6384bf9d2b9f086beec314c67cc
Size
57KB
MD5
c33feafd7689f6b8b9f35206898761d0
SHA1
ebece5b310dc80703d598f0902f5dede868507a3
SHA256
4d21cdfd812ba66276db02ab19861e8c86cdd6384bf9d2b9f086beec314c67cc
SHA512
c134118c92ab3cba86d092f4363f7bf2885dd061a35129be29f27c8da98f0225805fab9b490db763ffc8e9ba73c10e4582109d4d5e537a92ec7b76593d2da77a
SSDEEP
1536:PAq1mQqz+yyX1leWOfFyqNlMjgA7I9cyDEmQ3HLEJ:tm3zUDepyOonI+yDEmQ3wJ
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ