DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff1
TMDHookOn1
Behavioral task
behavioral1
Sample
057c3f2dc9f4303d074b87ca16a809d6.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
057c3f2dc9f4303d074b87ca16a809d6.dll
Resource
win10v2004-20231215-en
Target
057c3f2dc9f4303d074b87ca16a809d6
Size
33KB
MD5
057c3f2dc9f4303d074b87ca16a809d6
SHA1
45b657fa2c8fc21c08d2f8925a91092147a55b3e
SHA256
9b962e6bff8dbbded39768f882d9fc4a424b16449a6935394e66a8d764b9cae8
SHA512
615595ced57e59002617644b9cba96975f67fcf58b417bed355ba84f02326d1c4502eb074d4950a67d6f1dbace022f15a46640cb10de1efab05ac542d84b33d1
SSDEEP
768:loicqZOIQuuE3ICHJS2jkDzcfnb1El0Ql:lvcqZJQU3+D6b40Ql
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
Checks for missing Authenticode signature.
resource |
---|
057c3f2dc9f4303d074b87ca16a809d6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff1
TMDHookOn1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ