DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Behavioral task
behavioral1
Sample
9439234a7552d16d9139d78a476b0312935e41e8bf1c77d5c627f6b80e3090d6.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9439234a7552d16d9139d78a476b0312935e41e8bf1c77d5c627f6b80e3090d6.dll
Resource
win10v2004-20220901-en
Target
9439234a7552d16d9139d78a476b0312935e41e8bf1c77d5c627f6b80e3090d6
Size
44KB
MD5
11731cd0b8266a93c302d61bbd5537b2
SHA1
114bd0b2a1a0402c6fc26598a1427e4856723f24
SHA256
9439234a7552d16d9139d78a476b0312935e41e8bf1c77d5c627f6b80e3090d6
SHA512
7f4321dd46bc8b0a6c1f529454046dc660ffbbd1026236686d36f2855b7bcb4edbc600f064c3dfcc9e0a68e3a4fffd070333a5da1ee5498add1deb837e213981
SSDEEP
768:F88t3HdfNSvuh0KLZPMVGQULqEPTzBUjAAoXE+dAXXgUG32/:F7vYuh0KL2GtLPajAXXEqut/
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ