DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Behavioral task
behavioral1
Sample
208b101aedd339553aa990380a202e63.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
208b101aedd339553aa990380a202e63.dll
Resource
win10v2004-20231215-en
Target
208b101aedd339553aa990380a202e63
Size
90KB
MD5
208b101aedd339553aa990380a202e63
SHA1
003970b74b2343885e313d8c06bc55709a127121
SHA256
1b6ebb4f50fddaf7d48c48b3ab2734300519c13855a78e06835988d951f776bf
SHA512
e1c4ac1c7285ca27fa187e1edc31a8b54ddf922e571de3e9aa8b339e20337d37587355256860be1b40126c8a475edbcb97edf6c3129dd4084b96507e8bb1e00b
SSDEEP
1536:Y9qZQI0DMrqNKTGgbfw+Wqcr7QFQG4ekLajPTlm5A3B+eKx0S:D0DsaK6gbY++5NKhcjx0S
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
Checks for missing Authenticode signature.
resource |
---|
208b101aedd339553aa990380a202e63 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ